{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:14:20Z","timestamp":1742379260122,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194887","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"226-237","source":"Crossref","is-referenced-by-count":8,"title":["Scaling secure group communication systems: beyond peer-to-peer"],"prefix":"10.1109","author":[{"given":"Y.","family":"Amir","sequence":"first","affiliation":[]},{"given":"C.","family":"Nita-Rotaru","sequence":"additional","affiliation":[]},{"given":"J.","family":"Stanton","sequence":"additional","affiliation":[]},{"given":"G.","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1999","key":"ref33","article-title":"Openssl"},{"article-title":"The TLS Protocol Version 1.0. No. RFC2246","year":"1999","author":"dierks","key":"ref32"},{"key":"ref31","first-page":"38","article-title":"The Blowfish encryption algorithm","volume":"40","author":"schneier","year":"1994","journal-title":"Dr Dobb's Journal"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref35","first-page":"235","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"kim","year":"2000","journal-title":"Proceedings of 7th ACM Conference on Computer and Communications Security"},{"year":"2001","key":"ref34","article-title":"Advanced Encryption Standard (AES). No. FIPS 197"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/210223.210224"},{"key":"ref11","first-page":"938","article-title":"A high performance totally ordered multicast protocol","author":"whetten","year":"1994","journal-title":"Theory and Practice in Distributed Systems International Workshop Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1998.656294"},{"key":"ref14","article-title":"Ensemble security","author":"rodeh","year":"1998","journal-title":"Tech Rep TR98-1703"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501982"},{"journal-title":"The Official PGP User's Guide","year":"1995","author":"zimmermann","key":"ref17"},{"key":"ref18","first-page":"99","article-title":"Antigone: A flexible framework for secure group communication","author":"mcdaniel","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/90.650139"},{"year":"0","key":"ref28","article-title":"Cliques"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918970"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022291"},{"key":"ref3","article-title":"The Spread wide area group communication system","author":"amir","year":"1998","journal-title":"Tech Rep 98-4 Johns Hopkins University Center of Networking and Distributed Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1994.302392"},{"key":"ref29","article-title":"A secure and efficient conference key distribution system","author":"burmester","year":"1994","journal-title":"Advances in Cryptology - EUROCRYPT'94"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/259380.259422"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/227210.227229"},{"journal-title":"Reliable Distributed Computing with the Isis Toolkit","year":"1994","author":"birman","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45546-9_10"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243613"},{"year":"2002","key":"ref1","article-title":"The Keyed-Hash Message Authentication Code (HMAC)"},{"key":"ref20","article-title":"Partitionable virtual synchrony using extended virtual synchrony","author":"schultz","year":"2001","journal-title":"Department9 of Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/503112.503113"},{"journal-title":"Replication Using Group Communication over a Partitioned Network","year":"1995","author":"amir","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"article-title":"Tree-based group key agreement","year":"2002","author":"kim","key":"ref26"},{"key":"ref25","article-title":"Communication-efficient group key agreement","author":"kim","year":"2001","journal-title":"Proceedings of IFIP SEC 2001"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194887.pdf?arnumber=1194887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:04:38Z","timestamp":1497585878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194887\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194887","relation":{},"subject":[]}}