{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:17:18Z","timestamp":1753888638670,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscc.2003.1214216","type":"proceedings-article","created":{"date-parts":[[2004,3,30]],"date-time":"2004-03-30T17:17:26Z","timestamp":1080667046000},"page":"803-808","source":"Crossref","is-referenced-by-count":7,"title":["A new self-healing key distribution scheme"],"prefix":"10.1109","author":[{"given":"C.","family":"Blundo","sequence":"first","affiliation":[]},{"given":"P.","family":"D'Arco","sequence":"additional","affiliation":[]},{"given":"M.","family":"Listo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004375"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480196304246"},{"key":"17","first-page":"1","volume":"1962","author":"naor","year":"2000","journal-title":"Efficient Trace and Revoke Schemes Financial Cryptography 2000 Lecture Notes in Computer Science"},{"journal-title":"Key Management for Multicast Issues and Architectures Internet Draft (draft-wallner-key-arch-01 Txt","year":"0","author":"wallner","key":"23"},{"key":"18","article-title":"ELK, a new protocol for efficient large-group key distribution","author":"perrig","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"24","article-title":"Keystone: A group key management service","author":"wong","year":"2000","journal-title":"International Conference on Telecommunications"},{"key":"15","first-page":"40","volume":"2384","author":"kurnio","year":"2002","journal-title":"A Secure Rekeying Scheme with Key Recovery Property ACISP 2002 Lecture Notes in Computer Science"},{"key":"16","first-page":"41","volume":"2139","author":"naor","year":"2001","journal-title":"Revocation and Tracing Schemes for Stateless Receivers Advances in Cryptology-Crypto '01 Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","article-title":"The LSD broadcast encryption scheme, advances in cryptology-crypto '02","volume":"2442","author":"halevy","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"14","first-page":"609","volume":"1666","author":"kumar","year":"1999","journal-title":"Coding Constructions for Blacklisting Problems Without Computational Assumptions Advances in Cryptology-Crypto '99 Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0006-7"},{"key":"12","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/3-540-44598-6_21","article-title":"Long-lived broadcast encryption, advances in cryptology-crypto 2000","volume":"1880","author":"garay","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008268610932"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(98)80007-8"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/18.915661"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_50"},{"key":"1","first-page":"333","volume":"1716","author":"anzai","year":"0","journal-title":"A quick group key distribution scheme with entity revocation"},{"key":"10","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume":"773","author":"fiat","year":"1994","journal-title":"Broadcast Encryption Proceedings of Crypto '93 Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/047174882X"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/18.841169"},{"key":"5","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","article-title":"Efficient communication-storage tradeoffs for multicast encryption","volume":"1592","author":"canetti","year":"1999","journal-title":"Advances in Cryptology-Eurocrypt '99 Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237997"},{"key":"8","first-page":"262","article-title":"Fault tolerant and distributed broadcast encryption, rsa conference 2003 (ctrsa 2003)","volume":"2612","author":"d'arco","year":"2003","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"ISCC 2003 - International Symposium on Computers and Communications","acronym":"ISCC-03","location":"Kemer-Antalya, Turkey"},"container-title":["Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8616\/27298\/01214216.pdf?arnumber=1214216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T05:29:30Z","timestamp":1623734970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1214216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscc.2003.1214216","relation":{},"subject":[]}}