{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:20Z","timestamp":1750308980819,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T00:00:00Z","timestamp":1528329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1650573"],"award-info":[{"award-number":["CNS 1650573"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CableLabs"},{"name":"Furuno Electric Company"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672156"],"award-info":[{"award-number":["61672156"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SecureNoK"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,7]]},"DOI":"10.1145\/3205977.3205985","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"27-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Independent Key Distribution Protocols for Broadcast Authentication"],"prefix":"10.1145","author":[{"given":"Bruhadeshawr","family":"Bezawada","sequence":"first","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Sandeep","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[{"name":"Dongguan University of Technology, Dongguan, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320211"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.010"},{"volume-title":"Lower Bounds for Multicast Message Authentication. Advances in Cryptology (EUROCRYPT)","author":"Boneh Dan","key":"e_1_3_2_1_3_1","unstructured":"Dan Boneh , Glenn Durfee , and Matt Franklin . 2001. Lower Bounds for Multicast Message Authentication. Advances in Cryptology (EUROCRYPT) . Vol. Vol. 2045 . 437--452. Dan Boneh, Glenn Durfee, and Matt Franklin. 2001. Lower Bounds for Multicast Message Authentication. Advances in Cryptology (EUROCRYPT). Vol. Vol. 2045. 437--452."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892879"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti Juan Garay Gene Itkis Daniele Micciancio Moni Naor and Benny Pinkas. 1999. Multicast security: a taxonomy and some efficient constructions Proc. of the IEEE Joint Conf. on Computer Communications (INFOCOM). 708--716.  Ran Canetti Juan Garay Gene Itkis Daniele Micciancio Moni Naor and Benny Pinkas. 1999. Multicast security: a taxonomy and some efficient constructions Proc. of the IEEE Joint Conf. on Computer Communications (INFOCOM). 708--716.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.06.007"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.06.001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.12.005"},{"volume-title":"The Combinatorics of Network Reliability","author":"Colbourn C. J","key":"e_1_3_2_1_9_1","unstructured":"C. J Colbourn . 1987. The Combinatorics of Network Reliability . Oxford University Press . C. J Colbourn. 1987. The Combinatorics of Network Reliability. Oxford University Press."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191355"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452001.1452008"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252869"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056506"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_5"},{"key":"e_1_3_2_1_17_1","volume-title":"Conf. on Distrib. Computing Sys. Workshops (ICDCSW). IEEE, 220--225","author":"Hossain Mahmud","year":"2017","unstructured":"Mahmud Hossain , Ragib Hasan , and Anthony Skjellum . 2017 . Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems Proc. of IEEE Int . Conf. on Distrib. Computing Sys. Workshops (ICDCSW). IEEE, 220--225 . Mahmud Hossain, Ragib Hasan, and Anthony Skjellum. 2017. Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems Proc. of IEEE Int. Conf. on Distrib. Computing Sys. Workshops (ICDCSW). IEEE, 220--225."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/501436.501437"},{"key":"e_1_3_2_1_19_1","first-page":"295","article-title":"Broadcast-enhanced Key Predistribution Schemes","volume":"2012","author":"Kendall Michelle","year":"2012","unstructured":"Michelle Kendall , Keith M. Martin , Siaw-Lynn Ng , Maura B. Paterson , and Douglas R. Stinson . 2012 . Broadcast-enhanced Key Predistribution Schemes . IACR Cryptology ePrint Archive Vol. 2012 (2012), 295 . Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, and Douglas R. Stinson. 2012. Broadcast-enhanced Key Predistribution Schemes. IACR Cryptology ePrint Archive Vol. 2012 (2012), 295.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098252"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.05.017"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646283.687987"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_21"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of the Network and Distributed System Security Symposium (NDSS).","author":"Liu Dongang","year":"2003","unstructured":"Dongang Liu and Peng Ning . 2003 . Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks . In Proc. of the Network and Distributed System Security Symposium (NDSS). Dongang Liu and Peng Ning. 2003. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. In Proc. of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646033.677540"},{"key":"e_1_3_2_1_26_1","volume-title":"Revocation and Tracing Schemes for Stateless Receivers. Electronic Colloquium on Computational Complexity (ECCC)","author":"Naor Dalit","year":"2002","unstructured":"Dalit Naor , Moni Naor , and Jeffery Lotspiech . 2002. Revocation and Tracing Schemes for Stateless Receivers. Electronic Colloquium on Computational Complexity (ECCC) ( 2002 ). Dalit Naor, Moni Naor, and Jeffery Lotspiech. 2002. Revocation and Tracing Schemes for Stateless Receivers. Electronic Colloquium on Computational Complexity (ECCC) (2002)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.30"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.01.009"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9749-4"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/16.3-4.402"},{"key":"e_1_3_2_1_31_1","volume-title":"2002 a. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes","author":"Perrig Adrian","year":"2002","unstructured":"Adrian Perrig , Ran Canetti , J. D. Tygar , and Dawn Song . 2002 a. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes Vol. 5 ( 2002 ). Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. 2002 a. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes Vol. 5 (2002)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_33_1","volume-title":"LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks Proc. of the Int. Conf. on Parallel Processing Workshops (ICPP). 397--406","author":"Pietro Di","year":"2003","unstructured":"Di Pietro , L. V. Mancini , Y. W. Law , S. Etalle , and P. J. M. Havinga . 2003 . LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks Proc. of the Int. Conf. on Parallel Processing Workshops (ICPP). 397--406 . Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. J. M. Havinga. 2003. LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks Proc. of the Int. Conf. on Parallel Processing Workshops (ICPP). 397--406."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.01.009"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_1_36_1","volume-title":"Spatial Signatures for Lightweight Security in Wireless Sensor Networks Proc. of the IEEE Joint Conference on Computer Communications (INFOCOM). 2137--2145","author":"Sang Lifeng","year":"2008","unstructured":"Lifeng Sang and Anish Arora . 2008 . Spatial Signatures for Lightweight Security in Wireless Sensor Networks Proc. of the IEEE Joint Conference on Computer Communications (INFOCOM). 2137--2145 . Lifeng Sang and Anish Arora. 2008. Spatial Signatures for Lightweight Security in Wireless Sensor Networks Proc. of the IEEE Joint Conference on Computer Communications (INFOCOM). 2137--2145."},{"key":"e_1_3_2_1_37_1","volume-title":"The Doctrine of Chances (1718, 1738, 1756). Grattan-Guinness, I., Landmark Writings in Western Mathematics 1640--1940","author":"Schneider Ivor","year":"2005","unstructured":"Ivor Schneider . 2005. Abraham De Moivre , The Doctrine of Chances (1718, 1738, 1756). Grattan-Guinness, I., Landmark Writings in Western Mathematics 1640--1940 ( 2005 ). Ivor Schneider. 2005. Abraham De Moivre, The Doctrine of Chances (1718, 1738, 1756). Grattan-Guinness, I., Landmark Writings in Western Mathematics 1640--1940 (2005)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_3_2_1_40_1","volume-title":"Storage-Efficient Stateless Group Key Revocation. Proc. of Int. Conf. on Information Security (ISC) (Lecture Notes in Computer Science)","volume":"3225","author":"Wang Pan","unstructured":"Pan Wang , Peng Ning , and Douglas S. Reeves . 2004 . Storage-Efficient Stateless Group Key Revocation. Proc. of Int. Conf. on Information Security (ISC) (Lecture Notes in Computer Science) , Vol. Vol. 3225 . Springer. Pan Wang, Peng Ning, and Douglas S. Reeves. 2004. Storage-Efficient Stateless Group Key Revocation. Proc. of Int. Conf. on Information Security (ISC) (Lecture Notes in Computer Science), Vol. Vol. 3225. Springer."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.793005"},{"volume-title":"A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks. New Technologies, Mobility and Security","author":"Wu Taojun","key":"e_1_3_2_1_43_1","unstructured":"Taojun Wu , Yi Cui , Brano Kusy , Akos Ledeczi , Janos Sallai , Nathan Skirvin , Jan Werner , and Yuan Xue . 2007. A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks. New Technologies, Mobility and Security . Springer , Dordrecht , 53--63. Taojun Wu, Yi Cui, Brano Kusy, Akos Ledeczi, Janos Sallai, Nathan Skirvin, Jan Werner, and Yuan Xue. 2007. A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks. New Technologies, Mobility and Security. Springer, Dordrecht, 53--63."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.98"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705584"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.10.001"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2721424"},{"key":"e_1_3_2_1_49_1","volume-title":"BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks Proc. of the IEEE Global Telecommunications Conf. (GLOBECOM).","author":"Zhou Yun","year":"2006","unstructured":"Yun Zhou and Yuguang Fang . 2006 . BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks Proc. of the IEEE Global Telecommunications Conf. (GLOBECOM). Yun Zhou and Yuguang Fang. 2006. BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks Proc. of the IEEE Global Telecommunications Conf. (GLOBECOM)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1239326.1239327"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"}],"event":{"name":"SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT '18"},"container-title":["Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3205985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205977.3205985","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205977.3205985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:02Z","timestamp":1750282862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3205985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,7]]},"references-count":51,"alternative-id":["10.1145\/3205977.3205985","10.1145\/3205977"],"URL":"https:\/\/doi.org\/10.1145\/3205977.3205985","relation":{},"subject":[],"published":{"date-parts":[[2018,6,7]]},"assertion":[{"value":"2018-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}