{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:05:59Z","timestamp":1761401159244,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icnp.2002.1181419","type":"proceedings-article","created":{"date-parts":[[2003,8,27]],"date-time":"2003-08-27T11:03:45Z","timestamp":1061982225000},"page":"322-331","source":"Crossref","is-referenced-by-count":40,"title":["Distributed collaborative key agreement protocols for dynamic peer groups"],"prefix":"10.1109","author":[{"given":"P.P.C.","family":"Lee","sequence":"first","affiliation":[]},{"given":"J.C.S.","family":"Lui","sequence":"additional","affiliation":[]},{"given":"D.K.Y.","family":"Yau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"235","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"kim","year":"2000","journal-title":"Proc of 7th ACM Conference on Computer and Communications Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10","article-title":"Key management for multicast: Issues and architectures. Internet draft draft-wallner-key-arch-00.txt","author":"wallner","year":"1999","journal-title":"Internet Engineering Task Force"},{"key":"1","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/BFb0053443","article-title":"A secure and efficient conference key distribution system","volume":"950","author":"burmester","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2000.848459","article-title":"Kronos: A scalable group re-keying approach for secure multicast","author":"setia","year":"2000","journal-title":"Proc 2000 IEEE Symp Security Privacy"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372153"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181419"},{"key":"4","article-title":"Communication-efficient group key agreement","author":"kim","year":"2001","journal-title":"Information Systems Security Proceedings of the 17th International Information Security Conference IFIP SEC'01"},{"key":"9","first-page":"380","article-title":"CLIQUES: A new approach to group key agreement","author":"steiner","year":"1998","journal-title":"IEEE International Conference on Distributed Computing Systems"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"1999","author":"stallings","key":"8"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/285237.285260","article-title":"Secure group communications using key graphs","author":"wong","year":"1998","journal-title":"Proc of ACM SIGCOMM'98"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383062"}],"event":{"name":"10th IEEE International Conference on Network Protocols","acronym":"ICNP-02","location":"Paris, France"},"container-title":["10th IEEE International Conference on Network Protocols, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8412\/26518\/01181419.pdf?arnumber=1181419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T20:08:58Z","timestamp":1497557338000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1181419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icnp.2002.1181419","relation":{},"subject":[]}}