{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T04:19:10Z","timestamp":1648527550509},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T00:00:00Z","timestamp":1207008000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1007\/s11235-008-9108-y","type":"journal-article","created":{"date-parts":[[2008,4,18]],"date-time":"2008-04-18T19:00:01Z","timestamp":1208545201000},"page":"145-156","source":"Crossref","is-referenced-by-count":2,"title":["Multicast deflector"],"prefix":"10.1007","volume":"37","author":[{"given":"Antonio","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Ricardo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,4,19]]},"reference":[{"key":"9108_CR1","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003). RTP: A transport protocol for real-time applications. IETF: RFC 3550."},{"key":"9108_CR2","unstructured":"Pinto, A., & Ricardo, M. (2005). Multiple video channel transmission using secure IP multicast. In Proceedings of Conftele2005\u20135th conference on telecommunications, Portugal."},{"key":"9108_CR3","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., & Waidner, M. (1998). CLIQUES: A\u00a0new approach to group key agreement. In Proceeding of IEEE ICDCS\u201998.","DOI":"10.1109\/ICDCS.1998.679745"},{"key":"9108_CR4","unstructured":"Multicast Security (MSEC), IETF Working Group. http:\/\/www.ietf.org\/html.charters\/msec-charter.html [1 August 2007]."},{"key":"9108_CR5","unstructured":"Hardjono, T., & Weis, B. (2004). The multicast group security architecture. IETF: RFC 3740."},{"key":"9108_CR6","unstructured":"Baugher, M., Canetti, R., & Dondeti, L. (2005). Multicast security (MSEC) group key management architecture. IETF: RFC 4046."},{"issue":"2","key":"9108_CR7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/997150.997157","volume":"34","author":"Y. Challal","year":"2004","unstructured":"Challal, Y., Bettahar, H., & Bouabdallah, A. (2004). SAKM: a scalable and adaptive key management approach for multicast communications. ACM SIGCOMM Computer Communication Review, 34(2), 55\u201370.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"3","key":"9108_CR8","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309\u2013329.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"9108_CR9","doi-asserted-by":"crossref","unstructured":"Mittra, S. (1997). Iolus: a framework for scalable secure multicast. In Proceeding of ACM SIGCOMM\u201997, Cannes, France.","DOI":"10.1145\/263105.263179"},{"issue":"17","key":"9108_CR10","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1016\/S0140-3664(00)00255-3","volume":"23","author":"L. Dondeti","year":"2000","unstructured":"Dondeti, L., Mukherjee, S., & Samal, A. (2000). Scalable secure one-to-many group communication using dual encryption. Computer Communications, 23(17), 1681\u20131701.","journal-title":"Computer Communications"},{"key":"9108_CR11","doi-asserted-by":"crossref","unstructured":"Briscoe, B. (1999). MARKS: zero side effect multicast key management using arbitrarily revealed key sequences. In Proceeding of first international COST264 workshop on networked communication.","DOI":"10.1007\/978-3-540-46703-8_19"},{"key":"9108_CR12","doi-asserted-by":"crossref","unstructured":"Molva, R., & Pannetrat, A. (1999). Scalable multicast security in dynamic groups. In Proceedings of 6th ACM conference on computer and communications security.","DOI":"10.1145\/319709.319723"},{"key":"9108_CR13","doi-asserted-by":"crossref","unstructured":"Setia, S., Koussih, S., Jajodia, S., & Harder, E. (2000). Kronos: a scalable group re-keying approach for secure multicast. In Proceeding of 2000 IEEE symposium on security and privacy.","DOI":"10.1109\/SECPRI.2000.848459"},{"key":"9108_CR14","doi-asserted-by":"crossref","unstructured":"Rafaeli, S., & Hutchison, D. (2002). Hydra: A decentralized group key management. In Proceeding of 11th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises (WETICE\u201902). Los Alamitos, California.","DOI":"10.1109\/ENABL.2002.1029990"},{"key":"9108_CR15","unstructured":"Perrig, A., Song, D., Canetti, R., Tygar, J., & Briscoe, B. (2005). Timed efficient stream loss-tolerant authentication (TESLA): multicast source authentication transform introduction. IETF: RFC 4062."},{"key":"9108_CR16","unstructured":"Baugher, M., Weis, B., Hardjono, T., & Harney, H. (2003). The group domain of interpretation. IETF: RFC 3547."},{"key":"9108_CR17","unstructured":"Arkko, J., Carrara, E., Lindholm, F., Naslund, M., & Norrman, K. (2004). MIKEY: multimedia internet keying. IETF: RFC 3820."},{"key":"9108_CR18","unstructured":"Handley, M., Schulzrinne, H., Schooler, E., & Rosenberg, J. (1999). SIP: Session initiation protocol. IETF: RFC 2543."},{"key":"9108_CR19","unstructured":"Harney, H., Meth, U., Colegrove, A., & Gross, G. (2006). GSAKMP: Group secure association key management protocol. IETF: RFC 4535."},{"key":"9108_CR20","unstructured":"Colegrove, A., & Harney, H. (1999). Group security policy token v1. IETF: RFC 4534."},{"key":"9108_CR21","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/568567.568570","volume":"XXXII","author":"H. Chu","year":"2002","unstructured":"Chu, H., Qiao, L., Nahrstedt, K., & Wang, H. (2002). A secure multicast protocol with copyright protection. ACM Computer Communication Review Journal (ACM CCR), XXXII, 42\u201360.","journal-title":"ACM Computer Communication Review Journal (ACM CCR)"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-008-9108-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-008-9108-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-008-9108-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:47:11Z","timestamp":1559386031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-008-9108-y"}},"subtitle":["Secure video distribution system"],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,4]]}},"alternative-id":["9108"],"URL":"https:\/\/doi.org\/10.1007\/s11235-008-9108-y","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,4]]}}}