{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:10Z","timestamp":1750221250576,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3233252","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["To Trust or Not to Trust"],"prefix":"10.1145","author":[{"given":"Robert","family":"Annessi","sequence":"first","affiliation":[{"name":"Institute of Telecommunications, TU Wien, Vienna, Austria"}]},{"given":"Joachim","family":"Fabini","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, TU Wien, Vienna, Austria"}]},{"given":"Tanja","family":"Zseby","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, TU Wien, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452261"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600067NM"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27712-7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"3GPP. TS 33.210 Network Domain Security (NDS); IP network layer security Rel. 14. Dec. 2016.  3GPP. TS 33.210 Network Domain Security (NDS); IP network layer security Rel. 14. Dec. 2016.","DOI":"10.1016\/S1353-4858(16)30018-6"},{"key":"e_1_3_2_1_5_1","volume-title":"Internet Engineering Task Force","author":"Weis B.","year":"2011","unstructured":"B. Weis , S. Rowles , and T. Hardjono . The Group Domain of Interpretation. RFC 6407 (Proposed Standard) . Internet Engineering Task Force , Oct. 2011 . URL:http:\/\/www.ietf.org\/rfc\/rfc6407.txt. B. Weis, S. Rowles, and T. Hardjono. The Group Domain of Interpretation. RFC 6407 (Proposed Standard). Internet Engineering Task Force, Oct. 2011. URL:http:\/\/www.ietf.org\/rfc\/rfc6407.txt."},{"key":"e_1_3_2_1_6_1","unstructured":"3GPP. TS 33.401 3GPP System Architecture Evolution (SAE) Rel. 15. June 2017.  3GPP. TS 33.401 3GPP System Architecture Evolution (SAE) Rel. 15. June 2017."},{"key":"e_1_3_2_1_7_1","unstructured":"3GPP. TS 33.246 Security of Multimedia Broadcast\/Multicast Service (MBMS) Rel. 14. Dec. 2016.  3GPP. TS 33.246 Security of Multimedia Broadcast\/Multicast Service (MBMS) Rel. 14. Dec. 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2004.5342292"},{"key":"e_1_3_2_1_9_1","volume-title":"CANS '17","author":"Annessi R.","year":"2017","unstructured":"R. Annessi , T. Zseby , and J. Fabini . A new Direction for Research on Data Origin Authentication in Group Communication. In To appear in: Proceedings of the 16th International Conference on Cryptology and Network Security . In CANS '17 , 2017 . R. Annessi, T. Zseby, and J. Fabini. A new Direction for Research on Data Origin Authentication in Group Communication. In To appear in: Proceedings of the 16th International Conference on Cryptology and Network Security. In CANS '17, 2017."},{"key":"e_1_3_2_1_10_1","first-page":"708","volume-title":"Multicast Security: A Taxonomy and Some Efficient Constructions. In. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM '99","volume":"2","author":"Canetti R.","year":"1999","unstructured":"R. Canetti , J. Garay , G. Itkis , D. Micciancio , M. Naor , and B. Pinkas . Multicast Security: A Taxonomy and Some Efficient Constructions. In. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM '99 . Vol. 2 , Mar. 1999 , pp. 708 -- 716 . R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM '99. Vol. 2, Mar. 1999, pp. 708--716."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02254791"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.10.009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2161960"},{"key":"e_1_3_2_1_14_1","volume-title":"Internet Engineering Task Force","author":"Perrig A.","year":"2005","unstructured":"A. Perrig , D. Song , R. Canetti , J. D. Tygar , and B. Briscoe . Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction. RFC 4082 (Informational) . Internet Engineering Task Force , June 2005 . URL: http:\/\/www.ietf.org\/rfc\/rfc4082.txt. A. Perrig, D. Song, R. Canetti, J. D. Tygar, and B. Briscoe. Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction. RFC 4082 (Informational). Internet Engineering Task Force, June 2005. URL: http:\/\/www.ietf.org\/rfc\/rfc4082.txt."},{"key":"e_1_3_2_1_15_1","first-page":"1233","volume-title":"Time Valid One-Time Signature for Time-Critical Multicast Data Authentication. In IEEE INFOCOM 2009","author":"Wang Q.","year":"2009","unstructured":"Q. Wang , H. Khurana , Y. Huang , and K. Nahrstedt . Time Valid One-Time Signature for Time-Critical Multicast Data Authentication. In IEEE INFOCOM 2009 , Apr. 2009 , pp. 1233 -- 1241 . Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication. In IEEE INFOCOM 2009, Apr. 2009, pp. 1233--1241."},{"key":"e_1_3_2_1_16_1","volume-title":"High-speed high-security signatures. Journal of cryptographic engineering, 2(2):77--89","author":"Bernstein D.J.","year":"2012","unstructured":"D.J. Bernstein , N. Duif , T. Lange , P. Schwabe , and B.-Y. Yang . High-speed high-security signatures. Journal of cryptographic engineering, 2(2):77--89 , 2012 . D.J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang. High-speed high-security signatures. Journal of cryptographic engineering, 2(2):77--89, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32298-3_13"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233252","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3233252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:51Z","timestamp":1750212471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233252"}},"subtitle":["Data Origin Authentication for Group Communication in 5G Networks"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":17,"alternative-id":["10.1145\/3230833.3233252","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3233252","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}