{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T05:37:58Z","timestamp":1759815478886,"version":"3.41.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Networks and Applications"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1023\/a:1020781305639","type":"journal-article","created":{"date-parts":[[2003,3,18]],"date-time":"2003-03-18T20:53:36Z","timestamp":1048020816000},"page":"503-511","source":"Crossref","is-referenced-by-count":36,"title":["Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues"],"prefix":"10.1007","volume":"7","author":[{"given":"Danilo","family":"Bruschi","sequence":"first","affiliation":[]},{"given":"Emilia","family":"Rosti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5097410_CR1","doi-asserted-by":"crossref","unstructured":"B.R. Badrinath, A. Acharya and T. Imielinski, Impact of mobility on distributed computations, ACM SIGOPS Review (1993) 15\u201320.","DOI":"10.1145\/155848.155853"},{"key":"5097410_CR2","doi-asserted-by":"crossref","unstructured":"A. Ballardie, Scalable multicast key distribution, RFC 1949 (May 1996).","DOI":"10.17487\/rfc1949"},{"key":"5097410_CR3","doi-asserted-by":"crossref","unstructured":"M. Burmester and Y.G. Desmedt, Efficient and secure conference key distribution, in: Proc. Security Protocol Workshop (1996) pp. 119\u2013129.","DOI":"10.1007\/3-540-62494-5_12"},{"key":"5097410_CR4","unstructured":"R. Canetti and B. Pinkas, A taxonomy of multicast security issues, Internet Draft, draft-canetti-secure-multicasttaxonomy-00.txt (April 1999)."},{"key":"5097410_CR5","doi-asserted-by":"crossref","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Minciaccio, M. Naor and B. Pinkas, Multicast security: A taxonomy and efficient reconstructions, in: Proc. IEEE INFOCOM'99 (1999).","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"5097410_CR6","unstructured":"G. Caronni, H. Lubich, A. Aziz, T. Markson and R. Skrenta, SKIP: Securing the Internet, in: Proc. IEEE 5th Workshop on Enabling Technologies (WET ICE) (1996)."},{"issue":"8","key":"5097410_CR7","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1109\/32.31350","volume":"15","author":"G.H. Chiou","year":"1989","unstructured":"G.H. Chiou and W.T. Chen, Secure broadcasting using the secure lock, IEEE Transactions on Software Engineering 15(8) (1989) 929\u2013934.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5097410_CR8","doi-asserted-by":"crossref","unstructured":"S.E. Deering, Multicast routing in internetworks and extended LANs, in: Proc. ACM SIGCOMM'88 (1988) pp. 55\u201377.","DOI":"10.1145\/52324.52331"},{"key":"5097410_CR9","doi-asserted-by":"crossref","unstructured":"A. Fiat and M. Naor, Broadcast encryption, in: Advances in Cryptology: CRYPTO'93, Lecture Notes in Computer Science, Vol. 773 (1993) pp. 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"issue":"3","key":"5097410_CR10","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/BF01200847","volume":"1","author":"L. Gong","year":"1995","unstructured":"L. Gong and N. Sacham, Multicast security and its extension to a mobile environment, Wireless Networks 1(3) (1995) 281\u2013295.","journal-title":"Wireless Networks"},{"key":"5097410_CR11","doi-asserted-by":"crossref","unstructured":"H. Harney and C. Muckenhirn, Group key management protocol (GKMP) specification, RFC 2093 (July 1997).","DOI":"10.17487\/rfc2093"},{"key":"5097410_CR12","doi-asserted-by":"crossref","unstructured":"H. Harney and C. Muckenhirn, Group key management protocol (GKMP) architecture, RFC 2094 (July 1997).","DOI":"10.17487\/rfc2094"},{"key":"5097410_CR13","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carel, The Internet key exchange (IKE), RFC 2409 (1998).","DOI":"10.17487\/rfc2409"},{"issue":"10","key":"5097410_CR14","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/194313.194317","volume":"37","author":"T. Imielinski","year":"1994","unstructured":"T. Imielinski and B.R. Badrinath, Mobile wireless computing: Challenges in data management, Communications of the ACM 37(10) (1994) 18\u201328.","journal-title":"Communications of the ACM"},{"key":"5097410_CR15","doi-asserted-by":"crossref","unstructured":"P. Kruus, A survey of multicast security issues and architectures, in: Proc. 21st National Information Systems Security Conference (1998).","DOI":"10.21236\/ADA462625"},{"key":"5097410_CR16","unstructured":"M. Macedonia and D. Brutzman, MBONE: The Multicast BackbONE, http:\/\/www.cs.ucl.ac.uk\/mice\/mbone_review.html"},{"key":"5097410_CR17","first-page":"185","volume":"293","author":"T. Matsumoto","year":"1988","unstructured":"T. Matsumoto and H. Imai, On the Key predistribution system \u2013 A practical solution to the key distribution problem, in: Advances in Cryptology: CRYPTO'87, Lecture Notes in Computer Science, Vol. 293 (1988) pp. 185\u2013193.","journal-title":"Advances in Cryptology: CRYPTO'87"},{"key":"5097410_CR18","doi-asserted-by":"crossref","unstructured":"D. Maugham, M. Schertler, M. Schneider and J. Turner, Internet security association and key management protocol (ISAKMP), RFC 2408 (November 1998).","DOI":"10.17487\/rfc2408"},{"key":"5097410_CR19","doi-asserted-by":"crossref","unstructured":"S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proc. ACM SIGCOMM'97 (1997) pp. 277\u2013288.","DOI":"10.1145\/263105.263179"},{"key":"5097410_CR20","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik and M. Waidner, Diffie\u2013Hellman key distribution extended to group communication, in: Proc. 3rd ACM Conf. on Computer and Communication Security (1996).","DOI":"10.1145\/238168.238182"},{"key":"5097410_CR21","unstructured":"M. Steiner, G. Tsudik and M. Waidner, Cliques: A protocol suite for key agreement in dynamic groups, Research Report RZ 2984 (#93030), IBM Z\u00fcrich Research Lab (1997)."},{"issue":"9","key":"5097410_CR22","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M. Waldvogel","year":"1999","unstructured":"M. Waldvogel, G. Caronni, D. Sun, N. Weiler and B. Plattner, The VersaKey framework: Versatile group key management, IEEE Journal on Selected Areas in Communications 17(9) (1999) 1614\u20131631.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"5097410_CR23","doi-asserted-by":"crossref","unstructured":"D.M. Wallner, E.J. Harder and R.C. Agee, Key management for multicast: Issues and architectures, RFC 2627 (June 1999).","DOI":"10.17487\/rfc2627"},{"key":"5097410_CR24","doi-asserted-by":"crossref","unstructured":"C.K. Wong, M. Gouda and S.S. Lam, Secure group communications using key graphs, in: Proc. ACM SIGGOMM'98 (1998) pp. 68\u201379.","DOI":"10.1145\/285237.285260"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1020781305639.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1020781305639\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1020781305639.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:04:07Z","timestamp":1747904647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1020781305639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["5097410"],"URL":"https:\/\/doi.org\/10.1023\/a:1020781305639","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2002,12]]}}}