{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T21:40:03Z","timestamp":1748382003454,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184661"},{"type":"electronic","value":"9783319184678"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18467-8_16","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T12:12:03Z","timestamp":1431087123000},"page":"237-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Authenticated File Broadcast Protocol"],"prefix":"10.1007","author":[{"given":"Sim\u00e3o","family":"Reis","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Faneca","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"16_CR1","unstructured":"Cardoso, J.: DETIboot: distribui\u00e7\u00e3o e arranque de sistemas Linux com redes WiFi. Master\u2019s thesis, University of Aveiro, Portugal (2013)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Faneca, C., Vieira, J., Z\u00faquete, A.: Fast image file distribution with fountain codes via a Wi-Fi Ad-hoc network, using low power processors. In: 16th Int. Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014), Funchal, Madeira, Portugal, September 2014","DOI":"10.1109\/NETWKS.2014.6959232"},{"key":"16_CR3","unstructured":"Faneca, C., Vieira, J., Z\u00faquete, A., Cardoso, J.: DETIboot: A fast, wireless system to install operating systems on students laptops. In: 2nd Int. Conf. on Advances in Computing, Electronics and Communication (ACEC 2014), Zurich, Switzerland, October 2014"},{"issue":"8","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/JSAC.2002.803996","volume":"20","author":"J Byers","year":"2002","unstructured":"Byers, J., Luby, M., Mitzenmacher, M.: A digital fountain approach to asynchronous reliable multicast. IEEE Journal on Selected Areas in Communications 20(8), 1528\u20131540 (2002)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1049\/ip-com:20050237","volume":"152","author":"DJC MacKay","year":"2005","unstructured":"MacKay, D.J.C.: Fountain codes. IEE Proceedings Communications 152(6), 1062\u20131068 (2005)","journal-title":"IEE Proceedings Communications"},{"key":"16_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0229-6","volume-title":"Secure Broadcast Communication: In Wired and Wireless Networks","author":"A Perrig","year":"2003","unstructured":"Perrig, A., Tygar, J.D.: Secure Broadcast Communication: In Wired and Wireless Networks. Springer, New York (2003)"},{"key":"16_CR7","unstructured":"IEEE Std 802.11e: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 8: Medium Access Control (MAC) Enhancements for Quality of Service (QoS) (2005)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Barker, E.B., Roginsky, A.L.: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. NIST SP - 800\u2013131A (2011)","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Bohli, J.M., Hessler, A., Ugus, O., Westhoff, D.: Security enhanced multi-hop over the air reprogramming with fountain codes. In: IEEE 34th Conference on Local Computer Networks (LCN 2009), pp. 850\u2013857, October 2009","DOI":"10.1109\/LCN.2009.5355011"},{"key":"16_CR10","unstructured":"Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proc. of IEEE Symposium on Security and Privacy, Washington, DC, USA (2002)"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/90.793005","volume":"7","author":"CK Wong","year":"1999","unstructured":"Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. IEEE\/ACM Transactions on Networking 7(4), 502\u2013513 (1999)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Yavuz, A.: An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages. IEEE Transactions on Information Forensics and Security 9(10), 1733\u20131742 (2014)","DOI":"10.1109\/TIFS.2014.2351255"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18467-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T21:22:22Z","timestamp":1748380942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18467-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184661","9783319184678"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18467-8_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}