{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:58:12Z","timestamp":1722913092410},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194969","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"222-227","source":"Crossref","is-referenced-by-count":1,"title":["Recommendations in using group key management algorithms"],"prefix":"10.1109","volume":"2","author":[{"family":"Weifeng Chen","sequence":"first","affiliation":[]},{"given":"L.R.","family":"Dondeti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"41","article-title":"Revocation and Tracing Schemes for Stateless Receivers","author":"naor","year":"2001","journal-title":"Advances in Cryptology - CRYPTO"},{"key":"ref11","article-title":"A Decentralised Architecture for Group Key Management","author":"rafaeli","year":"2000","journal-title":"Computing Department"},{"key":"ref12","article-title":"Kronos: A Scalable Rekeying Approach for Secure Multicast","author":"setia","year":"2000","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004375"},{"key":"ref14","article-title":"Key Management for Multicast: Issues and Architectures","author":"wallner","year":"0","journal-title":"IETF RFC 2627"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/285237.285260","article-title":"Secure Group Communications Using Key Graphs","author":"wong","year":"1998","journal-title":"Proceedings of ACM SIGCOMM'98"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383062"},{"journal-title":"Dartmouth Scalable Simulation Framework","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985773"},{"key":"ref3","article-title":"Performance Comparison of Stateful and Stateless Group Rekeying Algorithms","author":"chen","year":"2002","journal-title":"Proc Fourth Int l Workshop Networked Group Comm (NGC 02)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372153"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2000.860720"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1145\/263105.263179","article-title":"Iolus: A Framework for Scalable Secure Mul-ticasting","author":"mittra","year":"1997","journal-title":"Proceedings of ACM SIGCOMM'97"},{"key":"ref7","article-title":"Key Establishment in Large Dynamic Groups Using One-Way Function Trees","author":"mcgrew","year":"1998","journal-title":"Technical Report"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.1999.751455","article-title":"Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques","author":"chang","year":"1999","journal-title":"Proceedings of IEEE Infocom'99"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1996.546190"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/65.806981"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194969.pdf?arnumber=1194969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T14:51:51Z","timestamp":1585666311000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194969","relation":{},"subject":[]}}