{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T14:54:26Z","timestamp":1773240866178,"version":"3.50.1"},"reference-count":17,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2004,6]]},"DOI":"10.1109\/jcn.2004.6596636","type":"journal-article","created":{"date-parts":[[2014,10,16]],"date-time":"2014-10-16T15:35:36Z","timestamp":1413473736000},"page":"156-162","source":"Crossref","is-referenced-by-count":22,"title":["An architecture for key management in hierarchical mobile ad-hoc networks"],"prefix":"10.23919","volume":"6","author":[{"given":"Kyung Hyune","family":"Rhee","sequence":"first","affiliation":[{"name":"Division of Electronic, Computer and Telecommunication Engineering, Pukyong National University, Busan, Korea"}]},{"given":"Young Ho","family":"Park","sequence":"additional","affiliation":[{"name":"Division of Electronic, Computer and Telecommunication Engineering, Pukyong National University, Busan, Korea"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"Information and Computer Science University of California at Irvine, Irvine, USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.903973"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904964"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904805"},{"key":"ref13","first-page":"29","article-title":"An identity-based key exchange protocol","author":"gunther","year":"1989","journal-title":"Proc Advances in Cryptology EUROCRYPT&#x2019; 89 Lecture Notes in Computer Science 434"},{"key":"ref14","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc CRYPTO'84 Lecture Notes in Computer Science 196 Springer-Verlag"},{"key":"ref15","article-title":"Shortened digital signatures, signcryption and compact and unforgeable key agreement schemes","author":"zheng","year":"1998","journal-title":"IEEE Standard Specifications for Public-Key Cryptography"},{"key":"ref16","author":"menezes","year":"1997","journal-title":"Handbook of Applied Cryptography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"ref4","first-page":"213","article-title":"Identity based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proc Advances in Cryptology Crypt02001 Lecture Notes In Computer Science 2139 Springer-Verlag"},{"key":"ref3","article-title":"Key management for large dynamic groups: One-way function trees and amortized initialization","author":"balenson","year":"1999","journal-title":"IETF Internet Draft draft-balensongroupkeymgmt-oft-00 txt"},{"key":"ref6","first-page":"380","article-title":"Cliques: A new approach to group key agreement","author":"steiner","year":"1998","journal-title":"Proc IEEE ICDCS'98"},{"key":"ref5","first-page":"567","article-title":"Self-securing ad hoc wireless networks","author":"luo","year":"2002","journal-title":"Proc IEEE ISCC 2002"},{"key":"ref8","first-page":"235","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"kim","year":"2000","journal-title":"Proc ACM Conference on Computer and Communications Security 2000"},{"key":"ref7","first-page":"68","article-title":"Secure group communications using key graphs","author":"wong","year":"1998","journal-title":"proc ACM SIGCOMM'98"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022291"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918970"},{"key":"ref9","first-page":"229","article-title":"A communication-efficient group key agreement","author":"kim","year":"2001","journal-title":"Proc IFIP-SEC 2001"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5449605\/6596630\/06596636.pdf?arnumber=6596636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:56:22Z","timestamp":1760982982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6596636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6]]},"references-count":17,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2004.6596636","relation":{},"ISSN":["1976-5541","1229-2370"],"issn-type":[{"value":"1976-5541","type":"electronic"},{"value":"1229-2370","type":"print"}],"subject":[],"published":{"date-parts":[[2004,6]]}}}