{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:31Z","timestamp":1759133491922,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036930","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"82-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Sliding-window self-healing key distribution"],"prefix":"10.1145","author":[{"given":"Sara Miner","family":"More","sequence":"first","affiliation":[{"name":"University of California, CA"}]},{"given":"Michael","family":"Malkin","sequence":"additional","affiliation":[{"name":"Stanford University, CA"}]},{"given":"Jessica","family":"Staddon","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, CA"}]},{"given":"Dirk","family":"Balfanz","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, CA"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_50"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706154"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_32"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"Cover T.","year":"1991","unstructured":"T. Cover and J. Thomas . Elements of Information Theory . John Wiley and Sons, Inc. , 1991 .]] T. Cover and J. Thomas. Elements of Information Theory. John Wiley and Sons, Inc., 1991.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237997"},{"key":"e_1_3_2_1_6_1","first-page":"480","volume-title":"Advances in Cryptology - CRYPTO '93","author":"Fiat A.","year":"1993","unstructured":"A. Fiat and M. Naor . Broadcast encryption . In Advances in Cryptology - CRYPTO '93 , LNCS 773, pages 480 - 491 , 1993 .]] A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology - CRYPTO '93, LNCS 773, pages 480-491, 1993.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191195"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646037.678003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948141"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357834"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"LNCS 1962","author":"Naor M.","year":"2001","unstructured":"M. Naor and B. Pinkas . Efficient trace and revoke schemes. In Financial Cryptography , LNCS 1962 , pages 1 - 20 , 2001 .]] M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial Cryptography, LNCS 1962, pages 1-20, 2001.]]"},{"key":"e_1_3_2_1_13_1","first-page":"247","volume-title":"IEEE Symposium on Security and Privacy","author":"Perrig A.","year":"2001","unstructured":"A. Perrig , D. Song , and J. D. Tygar . Elk, a new protocol for efficient large-group key distribution . In IEEE Symposium on Security and Privacy , pages 247 - 262 , 2001 .]] A. Perrig, D. Song, and J. D. Tygar. Elk, a new protocol for efficient large-group key distribution. In IEEE Symposium on Security and Privacy, pages 247-262, 2001.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830521"},{"key":"e_1_3_2_1_16_1","volume-title":"Internet Draft (work in progress)","author":"Wallner D.","year":"1998","unstructured":"D. Wallner , E. Harder , and E. Agee . Key management for multicast: Issues and architectures . In Internet Draft (work in progress) , 1998 .]] D. Wallner, E. Harder, and E. Agee. Key management for multicast: Issues and architectures. In Internet Draft (work in progress), 1998.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285260"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Telecommunications","author":"Wong C.","year":"2000","unstructured":"C. Wong and S. Lam . Keystone: A group key management service . In International Conference on Telecommunications , 2000 .]] C. Wong and S. Lam. Keystone: A group key management service. In International Conference on Telecommunications, 2000.]]"}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036930","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":18,"alternative-id":["10.1145\/1036921.1036930","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036930","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}