{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T21:10:09Z","timestamp":1777497009673,"version":"3.51.4"},"reference-count":36,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,3,3]]},"DOI":"10.1080\/19393555.2023.2198737","type":"journal-article","created":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T10:49:36Z","timestamp":1682074176000},"page":"97-120","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["A lightweight group key management scheme with constant rekeying cost and public bulletin size"],"prefix":"10.1080","volume":"33","author":[{"given":"Payal","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of Computer Science &amp; Engineering, National Institute of Technology Goa, Farmagudi, Ponda, Goa, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6252-2416","authenticated-orcid":false,"given":"Purushothama","family":"B R","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, National Institute of Technology Goa, Farmagudi, Ponda, Goa, India"}]}],"member":"301","published-online":{"date-parts":[[2023,4,21]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22010331"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01975-y"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.742"},{"key":"e_1_3_2_5_1","first-page":"3455","volume-title":"Proceedings of the 11th World Congress on Intelligent Control and Automation","author":"Bao X.","year":"2014","unstructured":"Bao, X., Liu, J., She, L., & Zhang, S. (2014). A key management scheme based on grouping within cluster. In Proceedings of the 11th World Congress on Intelligent Control and Automation, Shenyang, (p. 3455\u20133460). IEEE."},{"key":"e_1_3_2_6_1","first-page":"1952","volume-title":"Proceedings IEEE INFOCOM","author":"Chen Y. -R.","year":"2011","unstructured":"Chen, Y. -R., Tygar, J. D., & Tzeng, W. -G. (2011). Secure group key management using unidirectional proxy re-encryption schemes. In Proceedings IEEE INFOCOM, Shanghai, China, (p. 1952\u20131960). IEEE."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601061"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.32"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101948"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.40"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00258-x"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791405.2791440"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4465"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09363-x"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10090995"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2975226"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102003"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67550-9_8"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.022"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-018-0917-8"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.02.008"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01862-x"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2013.02.005"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1612"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2016.08.011"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412069"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2375555"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417320"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-008-9653-4"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5471-5"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1296"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2492981"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0352"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2753778"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.009"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2023.2198737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T02:57:19Z","timestamp":1705546639000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2023.2198737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,3]]}},"alternative-id":["10.1080\/19393555.2023.2198737"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2023.2198737","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}