{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:06:08Z","timestamp":1761401168679,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/reldis.2003.1238073","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"231-240","source":"Crossref","is-referenced-by-count":8,"title":["A reliable key authentication schema for secure multicast communications"],"prefix":"10.1109","author":[{"given":"R.","family":"Di Pietro","sequence":"first","affiliation":[]},{"given":"A.","family":"Durante","sequence":"additional","affiliation":[]},{"given":"L.V.","family":"Mancini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941203"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383062"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(02)00130-X"},{"key":"18","article-title":"CLIQUES: A protocol suite for key agreement in dynamic groups","author":"steiner","year":"1998","journal-title":"Proceedings 18th IEEE International Conference on Distributed Computing Systems"},{"key":"15","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-45546-9_12","article-title":"EHBT: An efficient protocol for group key management","volume":"2233","author":"rafaeli","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code","year":"1996","author":"schneier","key":"16"},{"key":"13","first-page":"247","article-title":"Elk, a new protocol for efficient large-group key distribution","author":"perrig","year":"2001","journal-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584504"},{"key":"11","first-page":"35","article-title":"Efficient and secure source authentication for multicast","author":"perrig","year":"2001","journal-title":"the Symposium on Network and Distributed System Security NDSS-95"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52331"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/49.790485"},{"key":"2","article-title":"Cryptographic hash functions: A suervey","author":"bkhtiari","year":"1995","journal-title":"Technical Report"},{"key":"1","article-title":"Key management for large dynamic groups: One-way function trees and amortized initialization","author":"balenson","year":"2002","journal-title":"Internet draft"},{"key":"10","first-page":"235","article-title":"Formalizing gdoi group key management requirements in npatrl","author":"meadows","year":"2001","journal-title":"Proceedings of the 8th ACM Conference on Computer and Communications Security"},{"key":"7","article-title":"Tree-based reliable multicast (tram)","author":"kandansky","year":"2000","journal-title":"IETF Internet Draft"},{"key":"6","first-page":"151","article-title":"The S\/KEY one-time password system","author":"haller","year":"1994","journal-title":"Proceedings of the Symposium on Network and Distributed System Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"4","first-page":"121","article-title":"A time driven methodolgy for keys dimensioning in secure multicast communications","author":"di pietro","year":"2003","journal-title":"Proceedings of the 18th International Conference on Information Security"},{"key":"9","article-title":"Key establishment in large dynamic groups using one-way function trees","volume":"755","author":"mcgrew","year":"1998","journal-title":"Technical Report"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"}],"event":{"name":"Proceedings 22nd International Symposium on Reliable Distributed Systems","start":{"date-parts":[[2003,10,6]]},"location":"Florence, Italy","end":{"date-parts":[[2003,10,8]]}},"container-title":["22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8774\/27777\/01238073.pdf?arnumber=1238073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T20:39:23Z","timestamp":1616186363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1238073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/reldis.2003.1238073","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}