{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:10:11Z","timestamp":1750291811341,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1461469.1461473","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A key management solution for overlay-live-streaming"],"prefix":"10.1145","author":[{"given":"Mathias","family":"Fischer","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t, Ilmenau, Germany"}]},{"given":"Guenter","family":"Schaefer","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t, Ilmenau, Germany"}]},{"given":"Robert","family":"Schmidt","sequence":"additional","affiliation":[{"name":"Denso Automotive, Eching, Germany"}]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[{"name":"Eur\u00e9com, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937506"},{"key":"e_1_3_2_1_2_1","unstructured":"Y. Challal and H. Seba \"Group key management protocols: A novel taxonomy.\" {Online}. Available: http:\/\/citeseer.ist.psu.edu\/challal05group.html  Y. Challal and H. Seba \"Group key management protocols: A novel taxonomy.\" {Online}. Available: http:\/\/citeseer.ist.psu.edu\/challal05group.html"},{"key":"e_1_3_2_1_3_1","volume-title":"Secure Group Communications Over Data Networks","author":"Zou X.","year":"2004","unstructured":"X. Zou , B. Ramamurthy , and S. S. Magliveras , Secure Group Communications Over Data Networks . Santa Clara, CA, USA : Springer-Verlag TELOS , 2004 . X. Zou, B. Ramamurthy, and S. S. Magliveras, Secure Group Communications Over Data Networks. Santa Clara, CA, USA: Springer-Verlag TELOS, 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"e_1_3_2_1_5_1","volume-title":"Key management for multicast: Issues and architecture","author":"Wallner D.","year":"1999","unstructured":"D. Wallner , E. Harder , and R. Agee , \" Key management for multicast: Issues and architecture ,\" 1999 , rFC 2627. D. Wallner, E. Harder, and R. Agee, \"Key management for multicast: Issues and architecture,\" 1999, rFC 2627."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263179"},{"key":"e_1_3_2_1_7_1","volume-title":"Improving the Latency in the Web: Caching or Multicast?\" in 3rd International WWW Caching Workshop","author":"Rodriguez P.","year":"1998","unstructured":"P. Rodriguez , E. W. Biersack , and K. W. Ross , \" Improving the Latency in the Web: Caching or Multicast?\" in 3rd International WWW Caching Workshop , 1998 . P. Rodriguez, E. W. Biersack, and K. W. Ross, \"Improving the Latency in the Web: Caching or Multicast?\" in 3rd International WWW Caching Workshop, 1998."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803066"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945474"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCW.2005.13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637220"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633045"},{"key":"e_1_3_2_1_14_1","volume-title":"Oct.","author":"Sripanidkulchai K.","year":"2004","unstructured":"K. Sripanidkulchai , B. Maggs , and H. Zhang , \" An analysis of live streaming workloads on the internet,\" Carnegie Mellon University , Oct. 2004 . K. Sripanidkulchai, B. Maggs, and H. Zhang, \"An analysis of live streaming workloads on the internet,\" Carnegie Mellon University, Oct. 2004."},{"issue":"1","key":"e_1_3_2_1_15_1","article-title":"Group key management protocols: A novel taxonomy","volume":"2","author":"Challal Y.","year":"2005","unstructured":"Y. Challal and H. Seba , \" Group key management protocols: A novel taxonomy ,\" International Journal of Information Technology , vol. 2 , no. 1 , Dec. 2005 . Y. Challal and H. Seba, \"Group key management protocols: A novel taxonomy,\" International Journal of Information Technology, vol. 2, no. 1, Dec. 2005.","journal-title":"International Journal of Information Technology"},{"key":"e_1_3_2_1_16_1","volume-title":"Multicast security: A taxonomy and efficient constructions,\" IETF","author":"Canetti R.","year":"1999","unstructured":"R. Canetti , J. Garay , G. Itkis , D. Micciancio , M. Naor , and B. Pinkas , \" Multicast security: A taxonomy and efficient constructions,\" IETF , 1999 . R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, \"Multicast security: A taxonomy and efficient constructions,\" IETF, 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_25"},{"key":"e_1_3_2_1_18_1","first-page":"215","article-title":"A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare","volume":"5441","author":"Abad C.","year":"2004","unstructured":"C. Abad , W. Yurcik , and R. Campbell , \" A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare ,\" International Society for Optical Engineering proceedings series , vol. 5441 , pp. 215 -- 226 , 2004 . C. Abad, W. Yurcik, and R. Campbell, \"A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare,\" International Society for Optical Engineering proceedings series, vol. 5441, pp. 215--226, 2004.","journal-title":"International Society for Optical Engineering proceedings series"},{"key":"e_1_3_2_1_19_1","volume-title":"July","author":"Harney H.","year":"1997","unstructured":"H. Harney and C. Muckenhirn , \" Group key management protocol (gkmp) specification,\" RFC 2093 (Experimental) , July 1997 . {Online}. Available: http:\/\/www.ietf.org\/rfc\/rfc2093.txt H. Harney and C. Muckenhirn, \"Group key management protocol (gkmp) specification,\" RFC 2093 (Experimental), July 1997. {Online}. Available: http:\/\/www.ietf.org\/rfc\/rfc2093.txt"},{"key":"e_1_3_2_1_20_1","volume-title":"July","author":"Harney H.","year":"1997","unstructured":"H. Harney and C. Muckenhirn , \" Group key management protocol (gkmp) architecture,\" RFC 2094 (Experimental) , July 1997 . {Online}. Available: http:\/\/www.ietf.org\/rfc\/rfc2094.txt H. Harney and C. Muckenhirn, \"Group key management protocol (gkmp) architecture,\" RFC 2094 (Experimental), July 1997. {Online}. Available: http:\/\/www.ietf.org\/rfc\/rfc2094.txt"},{"key":"e_1_3_2_1_21_1","volume-title":"Multicast security: A taxonomy and some efficient constructions,\" in INFOCOMM'99","author":"Canetti R.","year":"1999","unstructured":"R. Canetti , J. Garay , G. Itkis , D. Micciancio , M. Naor , and B. Pinkas , \" Multicast security: A taxonomy and some efficient constructions,\" in INFOCOMM'99 , 1999 . {Online}. Available: citeseer.ist.psu.edu\/canetti99multicast.html R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, \"Multicast security: A taxonomy and some efficient constructions,\" in INFOCOMM'99, 1999. {Online}. Available: citeseer.ist.psu.edu\/canetti99multicast.html"},{"key":"e_1_3_2_1_22_1","volume-title":"Elk, a new protocol for efficient large-group key distribution","author":"Perrig A.","year":"2001","unstructured":"A. Perrig , D. Song , and D. Tygar , \" Elk, a new protocol for efficient large-group key distribution ,\" 2001 . {Online}. Available: citeseer.ist.psu.edu\/perrig01elk.html A. Perrig, D. Song, and D. Tygar, \"Elk, a new protocol for efficient large-group key distribution,\" 2001. {Online}. Available: citeseer.ist.psu.edu\/perrig01elk.html"},{"key":"e_1_3_2_1_23_1","volume-title":"MILCOM","author":"DeCleene B.","year":"2001","unstructured":"B. DeCleene , L. Dondeti , S. Griffin , T. Hardjono , D. Kiwior , J. Kurose , D. Towsley , S. Vasudevan , and C. Zhang , \" Secure group communications for wireless networks,\" Military Communications Conference, 2001 . MILCOM 2001 . Communications for Network-Centric Operations : Creating the Information Force. IEEE, vol. 1, pp. 113--117 vol. 1, 2001. B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang, \"Secure group communications for wireless networks,\" Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, vol. 1, pp. 113--117 vol. 1, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"Irvine","author":"Kim Y.","year":"2002","unstructured":"Y. Kim , A. Perrig , and G. Tsudik , \" Tree-based group key agreement,\" University of California , Irvine , 2002 . Y. Kim, A. Perrig, and G. Tsudik, \"Tree-based group key agreement,\" University of California, Irvine, 2002."},{"key":"e_1_3_2_1_25_1","unstructured":"Y. Kim A. Perrig and Gene Tsudik \"Communication-efficient group key agreement.\" {Online}. Available: citeseer.ist.psu.edu\/kim01communicationefficient.html  Y. Kim A. Perrig and Gene Tsudik \"Communication-efficient group key agreement.\" {Online}. Available: citeseer.ist.psu.edu\/kim01communicationefficient.html"},{"key":"e_1_3_2_1_26_1","first-page":"108","volume-title":"Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies,\" in 2nd International Workshop on Security and Trust Management","author":"Strufe T.","year":"2006","unstructured":"T. Strufe , J. Wildhagen , and G. Sch\u00e4fer , \" Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies,\" in 2nd International Workshop on Security and Trust Management , 2006 , pp. 108 -- 118 . T. Strufe, J. Wildhagen, and G. Sch\u00e4fer, \"Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies,\" in 2nd International Workshop on Security and Trust Management, 2006, pp. 108--118."},{"key":"e_1_3_2_1_27_1","unstructured":"W. Dai Crypto++ v5.2.1 Aug. 2006.  W. Dai Crypto++ v5.2.1 Aug. 2006."}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique"],"location":"Istanbul Turkey","acronym":"Securecomm08"},"container-title":["Proceedings of the workshop on Security in Opportunistic and SOCial networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1461469.1461473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1461469.1461473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1461469.1461473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":26,"alternative-id":["10.1145\/1461469.1461473","10.1145\/1461469"],"URL":"https:\/\/doi.org\/10.1145\/1461469.1461473","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}