{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T05:43:08Z","timestamp":1733982188794,"version":"3.30.2"},"reference-count":20,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,11]]},"DOI":"10.1016\/s0167-4048(02)00814-3","type":"journal-article","created":{"date-parts":[[2002,12,28]],"date-time":"2002-12-28T12:34:16Z","timestamp":1041078856000},"page":"736-749","source":"Crossref","is-referenced-by-count":6,"title":["Differentially secure multicasting and its implementation methods"],"prefix":"10.1016","volume":"21","author":[{"given":"S","family":"Holeman","sequence":"first","affiliation":[]},{"given":"G","family":"Manimaran","sequence":"additional","affiliation":[]},{"given":"J","family":"Davis","sequence":"additional","affiliation":[]},{"given":"A","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00814-3_BIB1","doi-asserted-by":"crossref","unstructured":"T. Ballardie, P. Francis, and J. Crowcroft, 1993. \u201cCore-based trees (CBT): An architecture for scalable inter-domain multicast routing.\u201d In Proc. ACM SIGCOMM, 1993. pp. 85\u201395.","DOI":"10.1145\/166237.166246"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB2","doi-asserted-by":"crossref","unstructured":"D. Bell, and L. La Padula, 1976. \u201cSecure computer system: Unified Exposition and Multics Interpretation\u201d. MITRE Report, ESD-TR-75-306, March 1976.","DOI":"10.21236\/ADA023588"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB3","doi-asserted-by":"crossref","unstructured":"D.R. Cheriton and S.E. Deering, 1985. \u201cHost Groups: A Multicast Extension for Datagram Internetworks\u201d. In 9th Data Communication Symposium, IEEE Computer Society and ACM SIGCOMM, September 1985.","DOI":"10.1145\/319056.319039"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB4","doi-asserted-by":"crossref","unstructured":"D. Catalano and R. Gennaro, 1998. \u201cNew efficient and secure protocols for verifiable signature sharing and other applications.\u201d In Proc. CYRPTO\u201998, LNCS Vol. 1642, Springer-Verlag, 1998, pp.105\u201320.","DOI":"10.1007\/BFb0055723"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB5","doi-asserted-by":"crossref","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, 1999. \u201cMulticast security: A taxonomy and some efficient constructions\u201d. In Proc. IEEE Infocom, March 1999.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB6","doi-asserted-by":"crossref","unstructured":"S. Deering, 1988. \u201cMulticast routing in internetworks and extended LANs.\u201d In SIGCOMM \u201888, Stanford, CA, August 1988, pp. 55\u201364.","DOI":"10.1145\/52324.52331"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB7","doi-asserted-by":"crossref","unstructured":"Y.K. Dalal and R.M. Metcalfe, 1978. \u201cReverse path forwarding of broadcast packets.\u201d Communications of the ACM, Vol. 21, No. 12, December 1978, pp. 1040\u20131048.","DOI":"10.1145\/359657.359665"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB8","doi-asserted-by":"crossref","unstructured":"L. Gong and N. Shacham, 1994. \u201cElements of trusted multicasting\u201d. In Proceedings: 1994 International Conference on Network Protocols, IEEE Computer Society Press, October 1994.","DOI":"10.1109\/ICNP.1994.344380"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB9","unstructured":"T. Hardjono, B. Cain and N. Dorawswamy, 2000. \u201cA framework for group key management for multicast security\u201d. IETF Internet draft, August 2000. draft-ietf-ipsec-gkmframework-03.txt"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB10","doi-asserted-by":"crossref","unstructured":"S. Mittra 1997. \u201cIolus: A framework for scalable secure multicasting\u201d. In Proc. ACM SIGCOMM, 1997.","DOI":"10.1145\/263105.263179"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB11","doi-asserted-by":"crossref","unstructured":"M.J. Moyer, J.R. Rao and P. Rohatgi, 1999. \u201cA survey of security issues in multicast communications\u201d. IEEE Network, Nov\/Dec 1999, pp. 12\u201323.","DOI":"10.1109\/65.806981"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB12","unstructured":"UCB\/LBNL\/VINT Network Simulator \u2014 ns (version 2), Available at www.isi.edu\/nsnam\/ns."},{"key":"10.1016\/S0167-4048(02)00814-3_BIB13","unstructured":"Charles P. Pfleeger, 1997. Security in Computing. New Jersey: Prentice-Hall, 1997."},{"key":"10.1016\/S0167-4048(02)00814-3_BIB14","doi-asserted-by":"crossref","unstructured":"Steven B. Lipner, 1982. \u201cNon-Discretionary Controls for Commercial Applications\u201d. IEEE Symposium on Security and Privacy, 1982, pp. 2\u201310.","DOI":"10.1109\/SP.1982.10022"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB15","doi-asserted-by":"crossref","unstructured":"M. Ramalho 2000. \u201cIntra and inter-domain multicast routing protocols: A survey and a taxonomy\u201d. IEEE Communications Surveys & Tutorials, Vol. 3, No. 1, First Quarter 2000, pp. 2\u201325.","DOI":"10.1109\/COMST.2000.5340719"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB16","doi-asserted-by":"crossref","unstructured":"C. Shields and J.J. Garcia-Luna-Aceves, 1999. \u201cKHIP \u2014 A scalable protocol for secure multicast routing.\u201d ACM SIGCOMM, 1999.","DOI":"10.1145\/316194.316206"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB17","doi-asserted-by":"crossref","unstructured":"L. Sahasrabuddhe and B. Mukherjee, 2000. \u201cMulticast routing algorithms and protocols: A tutorial\u201d. IEEE Network, January\/February 2000, pp. 90\u2013102.","DOI":"10.1109\/65.819175"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB18","doi-asserted-by":"crossref","unstructured":"C.K. Wong, M. Gouda and S.S. Lam, 2000. \u201cSecure group communications using key graphs.\u201d IEEE\/ACM Transactions on Networking, Vol. 8, No. 1, February 2000, pp. 16\u201330.","DOI":"10.1109\/90.836475"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB19","doi-asserted-by":"crossref","unstructured":"Y. Huang, E. Fleury and P.K. McKinley, 1998. \u201cLCM: A multicast core management protocol for link-state routing networks.\u201d ICC, 1998, pp. 1197\u20131201.","DOI":"10.1109\/ICC.1998.685198"},{"key":"10.1016\/S0167-4048(02)00814-3_BIB20","doi-asserted-by":"crossref","unstructured":"S. Holeman, G. Manimaran and J. Davis, 2001. \u201cDifferentially Secure Multicasting and its Implementation Methods,\u201d in Proc. IEEE ICCCN, pp. 212\u2013217, 2001 (a shorter version of this paper).","DOI":"10.1109\/ICCCN.2001.956244"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802008143?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802008143?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T16:46:44Z","timestamp":1733935604000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802008143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2002,11]]}},"alternative-id":["S0167404802008143"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00814-3","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2002,11]]}}}