{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T20:10:25Z","timestamp":1738786225942,"version":"3.37.0"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1109\/jcn.2006.6182794","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T20:25:47Z","timestamp":1377894347000},"page":"461-474","source":"Crossref","is-referenced-by-count":0,"title":["Group key exchange over combined wired and wireless networks"],"prefix":"10.23919","volume":"8","author":[{"given":"Junghyun","family":"Nam","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, Sungkyunkwan University, Korea"}]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Sungkyunkwan University, Korea"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"1730","DOI":"10.1016\/j.comcom.2004.05.023","article-title":"Mutual authentication and group key agreement for low-power mobile devices","volume":"27","author":"bresson","year":"2004","journal-title":"Comput Commun"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.31"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/3-540-36178-2_31","article-title":"Group Diffie-Hellman key exchange secure against dictionary attacks","volume":"2501","author":"bresson","year":"2002","journal-title":"ASIACRYPT 2002 LNCS"},{"key":"ref32","first-page":"290","article-title":"Provably authenticated group Diffie-Hellman key exchange-the dynamic case","volume":"2248","author":"bresson","year":"2001","journal-title":"Proc Asi-acrypt2001 LNCS"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930137"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_47"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1015040.1015045"},{"key":"ref36","first-page":"115","article-title":"Constant round authenticated group key agreement via distributed computation","volume":"2947","author":"bresson","year":"2004","journal-title":"Proc 7th Int Workshop on Practice and Theory in Public Key Crypto LNCS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"ref34","first-page":"161","article-title":"Round-optimal contributory conference key agreement","volume":"2567","author":"boyd","year":"2003","journal-title":"Proc 6th Int Workshop Practice and Theory in Public Key Crypto LNCS"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/49.839937"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.1431161"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_10"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","article-title":"Scalable protocols for authenticated group key ex-change","volume":"2729","author":"katz","year":"2003","journal-title":"Proceedings of CRYPTO 2003 LNCS"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1007\/11593447_34","article-title":"Errors in computational complexity proofs for protocols","volume":"3788","author":"choo","year":"2005","journal-title":"Proc Asiacrypt 2005 LNCS"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/11535218_33","article-title":"HMQV: A high-performance secure Diffie-Hellman proto-col","volume":"3621","author":"krawczyk","year":"2005","journal-title":"Crypto 2005 LNCS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/871506.871518"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.825724"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.20"},{"key":"ref50","article-title":"Key management for multicast: issues and architectures","author":"wallner","year":"1999","journal-title":"RFC 2627 TETE"},{"key":"ref51","first-page":"247","article-title":"ELK, a new protocol for efficient large-group key distribution","author":"perrig","year":"2001","journal-title":"Proc IEEE Symp Security and Privacy"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref57","article-title":"Security architecture for the Internet protocol","author":"kent","year":"1998","journal-title":"RFC 2401"},{"article-title":"The SSL protocol version 3.0","year":"1996","author":"freier","key":"ref56"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","article-title":"Analysis of key-exchange protocols and their use for building secure channels","volume":"2045","author":"canetti","year":"2001","journal-title":"Proc Eurocrypt 2001"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358740"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref10","article-title":"On formal models for secure key exchange","author":"shoup","year":"1999","journal-title":"Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","article-title":"Authenticated key exchange secure against dictionary attacks","volume":"1807","author":"bellare","year":"2000","journal-title":"EUROCRYPT 2000 LNCS"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-540-30539-2_18","article-title":"Constant-round authenticated group key exchange for dynamic groups","volume":"3329","author":"kim","year":"2004","journal-title":"Proc Asiacrypt 2004 LNCS"},{"key":"ref12","first-page":"255","article-title":"Provably authenticated group Diffie-Hellman key exchange","author":"bresson","year":"2001","journal-title":"Computer Communications of the ACM"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","article-title":"Universally composable notions of key exchange and secure channels","volume":"2332","author":"canetti","year":"2002","journal-title":"Eurocrypt 2002 LNCS"},{"key":"ref14","first-page":"65","article-title":"Password-based authenticated key exchange in the three-party setting","volume":"3386","author":"abdalla","year":"2005","journal-title":"Proc 8th Int Workshop Practice and Theory in Public Key Crypto LNCS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102146"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.26"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","article-title":"Efficient password-authenticated key exchange using human-memorable passwords","volume":"2045","author":"katz","year":"2001","journal-title":"Eurocrypt'2001 LNCS"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","article-title":"Dynamic group Diffie-Hellman key exchange under standard assumptions","volume":"2332","author":"bresson","year":"2002","journal-title":"Eurocrypt 2002 LNCS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/49.17711"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056542"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","article-title":"A one round protocol for tripartite Diffie-Hellman","volume":"17","author":"joux","year":"2003","journal-title":"I Cryptology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"ref8","first-page":"232","article-title":"Entity authentication and key distribution","volume":"773","author":"bellare","year":"1993","journal-title":"Proc Crypto'93"},{"article-title":"Provably-secure mutual authentication and key establishment protocols lounge","year":"2006","author":"choo","key":"ref7"},{"key":"ref49","first-page":"68","article-title":"Secure group communications using key graphs","author":"wong","year":"1998","journal-title":"proc ACM SIGCOMM'98"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225084"},{"key":"ref46","first-page":"275","article-title":"A secure and efficient conference key distribution system","volume":"950","author":"burmester","year":"1994","journal-title":"Proc Eurocrypt 1994 LNCS"},{"key":"ref45","first-page":"1","article-title":"Communication complexity of group key distri-bution","author":"becker","year":"0","journal-title":"Proc 5th ACM Con! Computer and Commun Security 1998"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/25.994813"},{"key":"ref47","first-page":"172","article-title":"An unbalanced protocol for group key ex-change","volume":"3184","author":"herranz","year":"2004","journal-title":"Proc 1st Int Conf Trust Privacy and Security in Digital Business LNCS"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.10.024"},{"key":"ref41","first-page":"74","article-title":"Constant round dynamic group key agreement","volume":"3650","author":"dutta","year":"2005","journal-title":"Proc 8th Inform Security Conf LNCS"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/11767480_11","article-title":"Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks","volume":"3989","author":"tang","year":"2006","journal-title":"Proc 4th Int Con! Applied Crypto and Network Security LNCS"},{"key":"ref43","first-page":"427","article-title":"Password-based group key exchange in a constant number of rounds","volume":"3958","author":"abdalla","year":"2006","journal-title":"Proc 9th Int Workshop Practice and Theory in Public Key Crypto LNCS"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5449605\/6182781\/06182794.pdf?arnumber=6182794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T18:58:43Z","timestamp":1738781923000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6182794\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":58,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2006.6182794","relation":{},"ISSN":["1229-2370","1976-5541"],"issn-type":[{"type":"print","value":"1229-2370"},{"type":"electronic","value":"1976-5541"}],"subject":[],"published":{"date-parts":[[2006,12]]}}}