{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:45:47Z","timestamp":1761579947213},"reference-count":23,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s0140-3664(00)00255-3","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:56:47Z","timestamp":1027630607000},"page":"1681-1701","source":"Crossref","is-referenced-by-count":50,"title":["Scalable secure one-to-many group communication using dual encryption"],"prefix":"10.1016","volume":"23","author":[{"given":"L.R.","family":"Dondeti","sequence":"first","affiliation":[]},{"given":"S.","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"A.","family":"Samal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00255-3_BIB1","doi-asserted-by":"crossref","unstructured":"K. Almeroth, M. Ammar, Collection and modeling of the join\/leave behavior of multicast group members in the MBone, in: High Performance Distributed Computing Focus Workshop (HPDC\u201996), Syracuse, New York, August, 1996.","DOI":"10.1109\/HPDC.1996.546190"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB2","doi-asserted-by":"crossref","unstructured":"T. Ballardie, Scalable Multicast Key Distribution, RFC 1949, May, 1996.","DOI":"10.17487\/rfc1949"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB3","doi-asserted-by":"crossref","unstructured":"T. Ballardie, J. Crowcroft, Multicast-specific security threats and counter-measures, in: Proceedings of the Symposium on Network and Distributed System Security, San Diego, California, February 1995, pp. 2\u201316.","DOI":"10.1109\/NDSS.1995.390649"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB4","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly-Secure Key Distribution for Dynamic Conferences, Information and Computation, December 1997.","DOI":"10.1006\/inco.1998.2717"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB5","doi-asserted-by":"crossref","unstructured":"G. Caronni, M. Waldvogel, D. Sun, B. Plattner, Efficient security for large and dynamic groups, Technical Report TIK Technical Report No. 41, Computer Engineering and Networks Laboratory, Swiss Federal Institute of Technology, February 1998.","DOI":"10.1109\/ENABL.1998.725721"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB6","doi-asserted-by":"crossref","unstructured":"I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, Key management for secure internet multicast using boolean function minimization techniques, in: IEEE INFOCOM, New York, March, 1999.","DOI":"10.1109\/INFCOM.1999.751455"},{"issue":"6","key":"10.1016\/S0140-3664(00)00255-3_BIB7","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/90.650139","article-title":"Multicast framework for light-weight sessions and application level framing","volume":"5","author":"Floyd","year":"1997","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"10.1016\/S0140-3664(00)00255-3_BIB8","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/227234.227242","article-title":"The Yaksha security system","volume":"39","author":"Ganesan","year":"1996","journal-title":"Communications of the ACM"},{"issue":"3","key":"10.1016\/S0140-3664(00)00255-3_BIB9","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/49.564150","article-title":"Enclaves: Enablins secure collaboration over the internet","volume":"15","author":"Gong","year":"1997","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB10","doi-asserted-by":"crossref","unstructured":"L. Gong, N. Shacham, Elements of trusted multicasting, in: Proceedings of the IEEE International Conference on Network Protocols, Boston, MA, USA, October 1994, pp. 23\u201330.","DOI":"10.1109\/ICNP.1994.344380"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB11","doi-asserted-by":"crossref","unstructured":"H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094, July 1997.","DOI":"10.17487\/rfc2094"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB12","series-title":"Impact of Virtual Group Structure on Multicast Performance","volume":"vol. 1356","author":"Hofmann","year":"1997"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB13","article-title":"Anonymous credit cards and their collusion analysis","volume":"December","author":"Low","year":"1996","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB14","unstructured":"D.A. McGrew, A.T. Sherman, submitted for publication."},{"key":"10.1016\/S0140-3664(00)00255-3_BIB15","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1997"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB16","series-title":"Multicast Networking and Applications","author":"Kenneth Miller","year":"1998"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB17","doi-asserted-by":"crossref","unstructured":"S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proceedings of the ACM SIGCOMM, Cannes, France, September, 1997, pp. 277\u2013288.","DOI":"10.1145\/263105.263179"},{"issue":"1","key":"10.1016\/S0140-3664(00)00255-3_BIB18","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/35.649333","article-title":"Multicast transport protocols: a survey and taxonomy","volume":"36","author":"Obraczka","year":"1998","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB19","doi-asserted-by":"crossref","unstructured":"H. Schwetman, Introduction to process-oriented simulation and SCIM, in: Proceedings of the 1990 Winter Simulation Conference, 1990.","DOI":"10.1109\/WSC.1990.129506"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB20","unstructured":"T. Shiroshita, O. Takahashi, M. Yamashita, Integrating layered security into reliable multicast, in: Proceedings of the Third International Workshop on Protocols for Multimedia Systems, Madrid, October 1996."},{"key":"10.1016\/S0140-3664(00)00255-3_BIB21","series-title":"Network and Internetwork Security","author":"Stallings","year":"1995"},{"key":"10.1016\/S0140-3664(00)00255-3_BIB22","unstructured":"D. Wallner, E. Harder, R. Agee, Key management for multicast: issues and architecture, IETF Draft, July, 1997."},{"key":"10.1016\/S0140-3664(00)00255-3_BIB23","doi-asserted-by":"crossref","unstructured":"C.K. Wong, M. Gouda, S.S. Lam, Secure group communications using key graphs, in: Proceedings of the ACM SIGCOMM, August, 1998.","DOI":"10.1145\/285237.285260"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002553?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002553?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T06:25:27Z","timestamp":1579242327000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400002553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":23,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S0140366400002553"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00255-3","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}