{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:18:10Z","timestamp":1742393890280},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2002.1043066","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:36:53Z","timestamp":1056569813000},"page":"196-201","source":"Crossref","is-referenced-by-count":1,"title":["HySOR: group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers"],"prefix":"10.1109","author":[{"family":"Jinliang Fan","sequence":"first","affiliation":[]},{"given":"P.","family":"Judge","sequence":"additional","affiliation":[]},{"given":"M.H.","family":"Ammar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-46703-8_19","article-title":"Marks: Zero side-effect multicast key management using arbitrarily revealed key sequences","author":"briscoe","year":"1999","journal-title":"Proc First Int l Workshop on Networked Group Comm (NGC)"},{"key":"ref13","article-title":"A taxonomy of multicast security issues","author":"canetti","year":"1999","journal-title":"Internet Engineering Task Force Draft"},{"key":"ref14","article-title":"Scalable multicast key distribution","author":"ballardie","year":"1996","journal-title":"Request for Comments 1949 Internet Engineering Task Force"},{"key":"ref15","article-title":"Pricing multicast communications: A cost-based approach","author":"chuang","year":"1998","journal-title":"Proc INET 98"},{"key":"ref4","article-title":"Key management for multicast: Issues and architectures","author":"wallner","year":"1999","journal-title":"Request for Comments 2627 Internet Engineering Task Force"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285260"},{"key":"ref6","article-title":"Key management for large dynamic groups: One-way function trees and amortized initialization","author":"balenson","year":"1999","journal-title":"Internet Engineering Task Force Draft"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.1999.751455","article-title":"Key management for secure internet multicast using boolean function minimization techniques","author":"chang","year":"1999","journal-title":"Proceedings of the Conference on Computer Communications (IEEE Infocom)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916725"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263179"},{"key":"ref1","article-title":"Group key management protocol (GKMP) architecture","author":"harney","year":"1997","journal-title":"Request for Comments(RFC) 2094 Internet Eng Task Force"},{"key":"ref9","article-title":"A secure group key management communication lower bound","author":"richard yang","year":"2000","journal-title":"Tech Rep"}],"event":{"name":"Eleventh International Conference on Computer Communications and Networks","acronym":"ICCCN-02","location":"Miami, FL, USA"},"container-title":["Proceedings. Eleventh International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8081\/22349\/01043066.pdf?arnumber=1043066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T22:07:02Z","timestamp":1585001222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1043066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icccn.2002.1043066","relation":{},"subject":[]}}