{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:01Z","timestamp":1725489901319},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_75","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"684-694","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation and Analysis of Computational Complexity for Secure Multicast Models"],"prefix":"10.1007","author":[{"given":"Elijah R.","family":"Blessing","sequence":"first","affiliation":[]},{"given":"Rhymend","family":"Uthariaraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"issue":"1","key":"75_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C. Wong","year":"2000","unstructured":"C. Wong, M. Gouda, S.S. Lam, \u201cSecure group communication using key graphs,\u201d IEEE\/ACM Transaction on Networking, vol. 8, no. 1, Feb 2000, pp.16\u201330.","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"75_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/3-540-46416-6_50","volume-title":"advances in cryptology,EUROCRYPT91","author":"S. Berkovits","year":"1991","unstructured":"S. Berkovits, \u201cHow to broadcast a secret,\u201d in advances in cryptology,EUROCRYPT91, D.W. Davis, ed. Berlin, Germany: Springer Verlag,1991, vol.547, Lecture Notes in Computer Science, pp. 535\u2013541."},{"key":"75_CR3","unstructured":"R. Elijah Blessing, V. Rhymend Uthariaraj, \u201cLeaSel: An Efficient Key Management Model for Scalable Multicast System,\u201d in Proc. ICORD 2002, Dec 2002."},{"key":"75_CR4","unstructured":"R. Elijah Blessing, V. Rhymend Uthariaraj, \u201cSecure and Efficient Scalable Multicast Model for Online Network Games,\u201d in Proc. of 2 nd International Conference on Application and Development of Computer Games ADCOG 2003, pp.8\u201315."},{"key":"75_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology,CRYPTO\u201993","author":"A. Fiat","year":"1994","unstructured":"A. Fiat and M. Naor, \u201cBroadcast encryption,\u201d in Advances in Cryptology,CRYPTO\u201993, D.R. Stinson, Ed. Berlin, Germany: Springer Verlag,1994,vol.773, Lecture Notes in Computer Science, pp.480\u2013491."},{"key":"75_CR6","unstructured":"D.M. Wallner, E.J. Harder and R.C. Agee, \u201cKey management for multicast: Issues and architectures,\u201d RFC 2627, July 1997."},{"key":"75_CR7","doi-asserted-by":"crossref","unstructured":"R. Poovendran, S. Ahmed, S. Corson, and J. Baras, \u201cA Scalable Extension of Group Key Management Protocol,\u201d Technical Report TR 98-14, Institute for Systems Research, 1998.","DOI":"10.21236\/ADA441029"},{"key":"75_CR8","unstructured":"D. Balenson, D. McGrew, and A. Sherman, \u201cKey Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization,\u201d IETF Internet draft, August 2000."},{"key":"75_CR9","doi-asserted-by":"crossref","unstructured":"T. Dunigan and C. Cao, \u201cGroup key management,\u201d Experimental, July 1997.","DOI":"10.2172\/631269"},{"issue":"8","key":"75_CR10","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/32.31350","volume":"15","author":"G.H. Chiou","year":"1989","unstructured":"G.H. Chiou and W.T. Chen, \u201cSecure Broadcast Using the Secure Lock,\u201d IEEE Transactions on Software Engineering, 15(8):929\u2013934, August 1989.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"75_CR11","doi-asserted-by":"crossref","unstructured":"S. Mittra, \u201cIolus: A framework for scalable secure multicasting,\u201d Proc. of ACM SIGCOMM\u2019 97, pp.277\u2013288.","DOI":"10.1145\/263105.263179"},{"key":"75_CR12","doi-asserted-by":"crossref","unstructured":"R.H. Deng, L. Gong, A.A. Lazar and W. Wang,\u201cAuthenticated key distribution and secure broadcast using no conventional encryption: A unified approach based on block codes,\u201d in Proc.IEEE Globecom\u201995.Nov 1995.","DOI":"10.1109\/GLOCOM.1995.502592"},{"key":"75_CR13","doi-asserted-by":"crossref","unstructured":"H. Harney and C. Muckenhirn, \u201cGroup key management protocol (GKMP) architecture,\u201d RFC 2094, July 1997.","DOI":"10.17487\/rfc2094"},{"issue":"8","key":"75_CR14","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"Waldvogel","year":"1999","unstructured":"Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner., \u201cThe VersaKey Framework: Versatile Group Key Management,\u201d IEEE Journal on Selected Areas in Communications. (Special Issue on Middleware), 17(8): 1614\u20131631, August 1999.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"75_CR15","unstructured":"G. Caronni, M. Waldvogel, D. Sunand, and B. Plattner., \u201cEfficient Security for Large and Dynamic Multicast Groups,\u201d In Workshop on Enabling Technologies,(WETICE 98)."},{"key":"75_CR16","series-title":"Technical Report","volume-title":"Key Establishment in Large Dynamic Groups Using One-Way Function Trees","author":"D.A. McGrew","year":"1998","unstructured":"D.A. McGrew and A. T. Sherman. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. Technical Report No. 0755, TIS labs, Inc., Glenwood, MD, May 1998."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T02:13:17Z","timestamp":1556763197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":16,"URL":"http:\/\/dx.doi.org\/10.1007\/3-540-44843-8_75","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}