{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:08:33Z","timestamp":1722910113235},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2004.1283911","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"202-207","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing centralized secure group communications with binary key tree recomposition"],"prefix":"10.1109","volume":"1","author":[{"family":"Jen-Chiun Lin","sequence":"first","affiliation":[]},{"family":"Chien-Hua Tzeng","sequence":"additional","affiliation":[]},{"family":"Feipei Lai","sequence":"additional","affiliation":[]},{"family":"Hung-Chang Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Keystone: A group key management service","author":"wong","year":"2000","journal-title":"International Conference on Telecommunications ICT 2000"},{"key":"14","first-page":"208","article-title":"On key distribution in secure multicasting","author":"wu","year":"2000","journal-title":"Proceedings of the 25th Annual IEEE Conference on Local Computer Networks"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/90.502233"},{"key":"12","first-page":"68","article-title":"Secure group communications using key graphs","author":"wong","year":"1998","journal-title":"Proceedings of the ACM SIGCOMM'98"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872071"},{"journal-title":"Introduction to Algorithms","year":"1989","author":"cormen","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832254"},{"journal-title":"MediaBoard A Shared Whiteboard Application for the MBone","year":"1998","author":"tung","key":"10"},{"journal-title":"Maintaining balanced key trees for secure multicast","year":"1999","author":"moyer","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/263109.263179","article-title":"Iolus: A framework for scalable secure multicasting","author":"mittra","year":"1997","journal-title":"ACM SIGCOMM"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00012-3"},{"key":"4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/316194.316207","article-title":"IP multicast channels: EXPRESS support for large-scale single-source applications","author":"holbrook","year":"1999","journal-title":"Proceedings of the ACM SIGCOMM"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916725"},{"key":"8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/316194.316206","article-title":"KHIP - A scalable protocol for secure multicast routing","author":"shields","year":"1999","journal-title":"SIGCOMM"}],"event":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","location":"Fukuoka, Japan"},"container-title":["18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9028\/28652\/01283911.pdf?arnumber=1283911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T05:00:21Z","timestamp":1624424421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1283911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/aina.2004.1283911","relation":{},"subject":[]}}