{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T22:38:31Z","timestamp":1773959911795,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174906","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"9 pp.","source":"Crossref","is-referenced-by-count":11,"title":["Combinatorial optimization of multicast key management"],"prefix":"10.1109","author":[{"given":"L.","family":"Morales","sequence":"first","affiliation":[]},{"given":"I.H.","family":"Sudborough","sequence":"additional","affiliation":[]},{"given":"M.","family":"Eltoweissy","sequence":"additional","affiliation":[]},{"given":"M.H.","family":"Heydari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Group Key Management Protocol (GKMP) Specification","author":"harney","year":"0"},{"key":"ref3","article-title":"Key Management for Multicast: Issues and Architectures","author":"wallner","year":"1997","journal-title":"Informational RFC draft- wallner-key-arch-OO txt"},{"key":"ref6","article-title":"A Taxonomy of Multicast Security Issues","author":"canetti","year":"1998","journal-title":"Internet draft"},{"key":"ref5","article-title":"Group Secure Association Key Management Protocol","author":"harney","year":"1997","journal-title":"draft-harney-sparta-gsakmp-sec-OOO txt"},{"key":"ref8","article-title":"Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques","author":"chang","year":"0","journal-title":"Proceedings of INFOCOM'99"},{"key":"ref7","article-title":"Secure Group Communications Using Key Graphs","author":"wong","year":"0","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"ref2","first-page":"277","article-title":"Iolus: A Framework for Scalable Secure Multicasting","author":"mitra","year":"0","journal-title":"Proceedings of ACM SIGCOMM '97"},{"key":"ref9","article-title":"A Framework for Scalable Multicast Security with Bell-LaPadua Confidentiality Model","author":"eltoweissy","year":"2002","journal-title":"Journal of Internet Technology Special Issue on Network Security"},{"key":"ref1","article-title":"Scalable Multicast Key Distribution","author":"ballardie","year":"0"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","location":"Big Island, HI, USA","start":{"date-parts":[[2003,1,9]]},"end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174906.pdf?arnumber=1174906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T22:52:34Z","timestamp":1489445554000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174906","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}