{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:13:05Z","timestamp":1729671185914,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icppw.2003.1240393","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"385-390","source":"Crossref","is-referenced-by-count":11,"title":["Group keys and the multicast security in ad hoc networks"],"prefix":"10.1109","author":[{"family":"Tzu-Chiang Chiang","sequence":"first","affiliation":[]},{"family":"Yueh-Min Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"AMRoute: Adhoc Multicast Routing Protocol","author":"bommaiah","year":"1998","journal-title":"Internet-Draft draft - talpademanet-amroute-00 txt"},{"key":"ref11","article-title":"Ad hoc Multicast Routing protocol utilizing Increasing id-numberS (AMRIS) Functional Specification","author":"wu","year":"1998","journal-title":"Internet-Draft draft-ieft-manet-amris-spec-00 txt"},{"key":"ref12","first-page":"1298","article-title":"On-Demand Multicast Routing Protocol","author":"lee","year":"1999","journal-title":"Proceedings of IEEE WCNC'99"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022293"},{"key":"ref14","first-page":"31","article-title":"Diffie-Hellman key distribution extended to group communication","author":"steiner","year":"1996","journal-title":"3rd ACM Conference on Computer and Communications Security"},{"journal-title":"Policy Management An introduction Gartner Group\/Datapro Technical Report","year":"1999","author":"fisher","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/INFCOM.2000.832230","article-title":"A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols","volume":"2","author":"lee","year":"2000","journal-title":"INFOCOM 2000 Nineteenth Annual Joint Conference of IEEE Computer and communications Societies Proceedings IEEE"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904824"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"journal-title":"Genetic Algorithms and Engineering Design","year":"1997","author":"gen","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/PROC.1987.13702","article-title":"the darpa packet radio network protocols","volume":"75","author":"jubin","year":"1987","journal-title":"Proceedings of the IEEE"},{"journal-title":"Mobile Ad Hoc Networks (MANET) Working Group Charter","year":"0","key":"ref1"},{"key":"ref9","first-page":"642","article-title":"Security management in Hierarchical Ad Hoc Network","volume":"2","author":"yang","year":"2001","journal-title":"Info-tech and Info-net 2001 Proceedings ICII 2001 - Beijing 2001 International Conferences on"}],"event":{"name":"2003 International Conference on Parallel Processing Workshops","acronym":"ICPPW-03","location":"Kaohsiung, Taiwan"},"container-title":["2003 International Conference on Parallel Processing Workshops, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8781\/27812\/01240393.pdf?arnumber=1240393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:29Z","timestamp":1497585929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1240393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icppw.2003.1240393","relation":{},"subject":[]}}