{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T10:57:44Z","timestamp":1760266664958,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102219.1102227","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Key distribution and update for secure inter-group multicast communication"],"prefix":"10.1145","author":[{"given":"Weichao","family":"Wang","sequence":"first","affiliation":[{"name":"University of Kansas, Lawrence, KS"}]},{"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/501449.501464"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/49.790485"},{"key":"e_1_3_2_1_3_1","volume-title":"Key management for secure internet multicast using boolean function minimization techniques","author":"Chang I.","year":"1999","unstructured":"I. Chang , R. Engel , D. Kandlur , D. Pendarakis , and D. Saha . Key management for secure internet multicast using boolean function minimization techniques . In IEEE INFOCOM , 689--698, 1999 . I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha. Key management for secure internet multicast using boolean function minimization techniques. In IEEE INFOCOM, 689--698, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1023\/A:1019171616176"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/AERO.2002.1035238"},{"key":"e_1_3_2_1_6_1","volume-title":"Group Key Management Protocol (GKMP) Architecture. RFC 2094","author":"Harney H.","year":"1999","unstructured":"H. Harney and C. Muckenhirn . Group Key Management Protocol (GKMP) Architecture. RFC 2094 , 1999 . H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1999."},{"key":"e_1_3_2_1_7_1","first-page":"2627","author":"Wallner D.","year":"1999","unstructured":"D. Wallner , E. Harder , and R. Agee . Key Management for Multicast: Issues and Architectures. RFC 2627 , 1999 . D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC 2627, 1999.","journal-title":"Key Management for Multicast: Issues and Architectures. RFC"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/90.836475"},{"key":"e_1_3_2_1_10_1","volume-title":"Multicast Security: A Taxonomy and Some Efficient Constructions","author":"Canetti R.","year":"1999","unstructured":"R. Canetti , J. Garay , G. Itkis , D. Micciancio , M. Naor , and B. Pinkas . Multicast Security: A Taxonomy and Some Efficient Constructions . In IEEE INFOCOM , 708--716, 1999 . R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In IEEE INFOCOM, 708--716, 1999."},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Cryptology -- EUROCRYPT, 459--474","author":"Canetti R.","year":"1999","unstructured":"R. Canetti , T. Malkin , and K. Nissim . Efficient communication-storage tradeoffs for multicast encryption . In Advances in Cryptology -- EUROCRYPT, 459--474 , 1999 . R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In Advances in Cryptology -- EUROCRYPT, 459--474, 1999."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of IEEE Symposium on Security and Privacy","author":"Perrig A.","year":"2001","unstructured":"A. Perrig , D. Song , and J.D. Tygar . ELK, a new protocol for efficient large-group key distribution . In Proc. of IEEE Symposium on Security and Privacy , 2001 . A. Perrig, D. Song, and J.D. Tygar. ELK, a new protocol for efficient large-group key distribution. In Proc. of IEEE Symposium on Security and Privacy, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/263105.263179"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/S0140-3664(00)00255-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/319709.319723"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/647070.715969"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/648088.747480"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/882494.884414"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ICPPW.2003.1240395"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/986858.986872"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.21236\/ADA461548"},{"key":"e_1_3_2_1_23_1","volume-title":"Robust Membership Management for Ad-hoc Groups. in Proc. of Nordic Workshop on Secure IT Systems","author":"M\u00e4ki S.","year":"2000","unstructured":"S. M\u00e4ki , T. Aura , and M. Hietalahti . Robust Membership Management for Ad-hoc Groups. in Proc. of Nordic Workshop on Secure IT Systems , 2000 . S. M\u00e4ki, T. Aura, and M. Hietalahti. Robust Membership Management for Ad-hoc Groups. in Proc. of Nordic Workshop on Secure IT Systems, 2000."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. o IASTED International Conference on Communications and Computer Networks, 183--187","author":"Yasinsac A.","year":"2002","unstructured":"A. Yasinsac , V. Thakur , S. Carter , and I. Cubukcu . A Family of Protocols for Group Key Generation in Ad Hoc Networks . In Proc. o IASTED International Conference on Communications and Computer Networks, 183--187 , 2002 . A. Yasinsac, V. Thakur, S. Carter, and I. Cubukcu. A Family of Protocols for Group Key Generation in Ad Hoc Networks. In Proc. o IASTED International Conference on Communications and Computer Networks, 183--187, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/MILCOM.2001.985773"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1023\/A:1020781305639"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of IEEE International Conference on Performance, Computing, and Communications, 631--636","author":"Moharrum M.","year":"2004","unstructured":"M. Moharrum , R. Mukkamala , and M. Eltoweissy . CKDS: An Efficient Combinatorial Key Distribution Scheme for Wireless Ad-Hoc Networks . In Proc. of IEEE International Conference on Performance, Computing, and Communications, 631--636 , 2004 . M. Moharrum, R. Mukkamala, and M. Eltoweissy. CKDS: An Efficient Combinatorial Key Distribution Scheme for Wireless Ad-Hoc Networks. In Proc. of IEEE International Conference on Performance, Computing, and Communications, 631--636, 2004."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of International Conference on Mobile and Ubiquitous Systems: Networking and Services, 42--51","author":"Zhu S.","year":"2004","unstructured":"S. Zhu , S. Setia , S. Xu , and S. Jajodia . GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks . In Proc. of International Conference on Mobile and Ubiquitous Systems: Networking and Services, 42--51 , 2004 . S. Zhu, S. Setia, S. Xu, and S. Jajodia. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. In Proc. of International Conference on Mobile and Ubiquitous Systems: Networking and Services, 42--51, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5555\/829514.830521"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/948109.948141"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/1053283.1053287"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/1036921.1036930"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/TCOM.1982.1095533"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/MILCOM.2002.1179634"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/INFCOM.2003.1208919"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/71.877936"},{"key":"e_1_3_2_1_38_1","volume-title":"Jr. A Logic for the Exclusion Basis System. In Proc. of the Hawaii International Conference on System Sciences (HICSS)","author":"Redwine S.T.","year":"2004","unstructured":"S.T. Redwine Jr. A Logic for the Exclusion Basis System. In Proc. of the Hawaii International Conference on System Sciences (HICSS) , 2004 . S.T. Redwine Jr. A Logic for the Exclusion Basis System. In Proc. of the Hawaii International Conference on System Sciences (HICSS), 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.5555\/820756.821826"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.5555\/646111.679598"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/871506.871518"},{"key":"e_1_3_2_1_43_1","volume-title":"Energy Cost Analysis of IPSec on Handheld Devices. Microprocessors and Microsystems, special issue on Secure Computing Platform, 28(10), 585--594","author":"Ni P.","year":"2004","unstructured":"P. Ni and Z. Li . Energy Cost Analysis of IPSec on Handheld Devices. Microprocessors and Microsystems, special issue on Secure Computing Platform, 28(10), 585--594 , 2004 . P. Ni and Z. Li. Energy Cost Analysis of IPSec on Handheld Devices. Microprocessors and Microsystems, special issue on Secure Computing Platform, 28(10), 585--594, 2004."},{"key":"e_1_3_2_1_44_1","volume-title":"The handbook of ad hoc wireless networks, 25--40","author":"Chen X.","year":"2003","unstructured":"X. Chen and J. Wu . Multicasting techniques in mobile ad hoc networks . In The handbook of ad hoc wireless networks, 25--40 , CRC Press, Inc. , 2003 . X. Chen and J. Wu. Multicasting techniques in mobile ad hoc networks. In The handbook of ad hoc wireless networks, 25--40, CRC Press, Inc., 2003."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. of IEEE INFOCOM","author":"Ji L.","year":"2001","unstructured":"L. Ji and M. Corson . Differential destination multicast - a MANET multicast routing protocol for small groups , In Proc. of IEEE INFOCOM , 2001 . L. Ji and M. Corson. Differential destination multicast - a MANET multicast routing protocol for small groups, In Proc. of IEEE INFOCOM, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1023\/A:1025189828172"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1109\/INFCOM.2002.1019368"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. of IEEE Wireless Communications and Networking Conference (WCNC)","author":"Gui C.","year":"2003","unstructured":"C. Gui and P. Mohapatra . Efficient Overlay Multicast for Mobile Ad Hoc Networks , In Proc. of IEEE Wireless Communications and Networking Conference (WCNC) , 2003 . C. Gui and P. Mohapatra. Efficient Overlay Multicast for Mobile Ad Hoc Networks, In Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1109\/DISCEX.2003.1194890"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS05","name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Alexandria VA USA"},"container-title":["Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102227","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102219.1102227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102227"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":46,"alternative-id":["10.1145\/1102219.1102227","10.1145\/1102219"],"URL":"https:\/\/doi.org\/10.1145\/1102219.1102227","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}