{"id":"https://openalex.org/W2096950042","doi":"https://doi.org/10.1109/discex.2003.1194969","title":"Recommendations in using group key management algorithms","display_name":"Recommendations in using group key management algorithms","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W2096950042","doi":"https://doi.org/10.1109/discex.2003.1194969","mag":"2096950042"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100749973","display_name":"Weifeng Chen","orcid":"https://orcid.org/0000-0002-5850-0759"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Weifeng Chen","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts, Amherst, MA, USA","Dept. of Comput. Sci., Massachusetts Univ., Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Massachusetts Univ., Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070930904","display_name":"Lakshminath Dondeti","orcid":null},"institutions":[{"id":"https://openalex.org/I153908563","display_name":"Nortel (Canada)","ror":"https://ror.org/03rz4pm90","country_code":"CA","type":"company","lineage":["https://openalex.org/I153908563"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"L.R. Dondeti","raw_affiliation_strings":["Strategic Protocols Group, Nortel Networks Limited, Billerica, MA, USA","Strategic protocols group, Nortel Networks"],"affiliations":[{"raw_affiliation_string":"Strategic Protocols Group, Nortel Networks Limited, Billerica, MA, USA","institution_ids":[]},{"raw_affiliation_string":"Strategic protocols group, Nortel Networks","institution_ids":["https://openalex.org/I153908563"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100749973"],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":0.7472,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78103422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"222","last_page":"227"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rekeying","display_name":"Rekeying","score":0.9966574311256409},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.7706100940704346},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7703193426132202},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6115458011627197},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6068820953369141},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5232436060905457},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5105184316635132},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.48982831835746765},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.4737967848777771},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4616697132587433},{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.4363457262516022},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23235389590263367}],"concepts":[{"id":"https://openalex.org/C127150765","wikidata":"https://www.wikidata.org/wiki/Q7310605","display_name":"Rekeying","level":4,"score":0.9966574311256409},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.7706100940704346},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7703193426132202},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6115458011627197},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6068820953369141},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5232436060905457},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5105184316635132},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.48982831835746765},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.4737967848777771},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4616697132587433},{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.4363457262516022},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23235389590263367},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/discex.2003.1194969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.umass.edu:math_faculty_pubs-1288","is_oa":false,"landing_page_url":"https://scholarworks.umass.edu/math_faculty_pubs/289","pdf_url":null,"source":{"id":"https://openalex.org/S4306402057","display_name":"Scholarworks (University of Massachusetts Amherst)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I24603500","host_organization_name":"University of Massachusetts Amherst","host_organization_lineage":["https://openalex.org/I24603500"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mathematics and Statistics Department Faculty Publication Series","raw_type":"text"},{"id":"pmh:oai:scholarworks.umass.edu:20.500.14394/34535","is_oa":false,"landing_page_url":"https://hdl.handle.net/20.500.14394/34535","pdf_url":null,"source":{"id":"https://openalex.org/S4306402240","display_name":"ScholarWorks@UMassAmherst (University of Massachusetts Amherst)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I24603500","host_organization_name":"University of Massachusetts Amherst","host_organization_lineage":["https://openalex.org/I24603500"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"published","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1982665544","https://openalex.org/W2027356754","https://openalex.org/W2064967060","https://openalex.org/W2071470557","https://openalex.org/W2097539178","https://openalex.org/W2102217192","https://openalex.org/W2117771067","https://openalex.org/W2123918207","https://openalex.org/W2135750114","https://openalex.org/W2143545186","https://openalex.org/W2159945176","https://openalex.org/W2162767209","https://openalex.org/W2165482045","https://openalex.org/W2168571148","https://openalex.org/W2171574715","https://openalex.org/W6609405457","https://openalex.org/W6666953248","https://openalex.org/W6675055077"],"related_works":["https://openalex.org/W2188441851","https://openalex.org/W3082525907","https://openalex.org/W4205185683","https://openalex.org/W1992591017","https://openalex.org/W2163893531","https://openalex.org/W2042757992","https://openalex.org/W2905452220","https://openalex.org/W2186691333","https://openalex.org/W2120131082","https://openalex.org/W2312561444"],"abstract_inverted_index":{"We":[0,15,40,106],"study":[1,57],"the":[2,18,22,42,52,96,104,110],"advantages":[3],"and":[4,8,21,32,36,45,66],"applicability":[5],"of":[6,26,30,103,112],"stateful":[7],"stateless":[9,71,86],"rekeying":[10,23,38,53,65,72,87,116],"algorithms":[11,44,130],"to":[12,50,90],"different":[13,47],"applications.":[14],"analytically":[16],"compare":[17,51],"storage":[19],"cost":[20,24],"(number":[25],"unit-size":[27],"encrypted":[28],"messages)":[29],"LKH":[31,60],"SDR":[33],"in":[34,63,80,125],"immediate":[35,64],"batch":[37,68],"scenarios.":[39,134],"implemented":[41],"two":[43],"simulated":[46],"membership":[48,78],"scenarios":[49],"cost.":[54,117],"The":[55],"simulation":[56],"shows":[58],"that":[59],"performs":[61,73],"better":[62,74],"small":[67],"rekeying,":[69],"whereas":[70],"as":[75,92,94],"we":[76,122],"process":[77],"changes":[79],"larger":[81],"batches.":[82],"In":[83],"some":[84],"cases,":[85],"was":[88],"observed":[89],"be":[91],"inefficient":[93],"encrypting":[95],"group":[97,127],"key":[98,128],"separately":[99],"for":[100,131],"each":[101],"member":[102,113],"group.":[105],"also":[107],"report":[108],"on":[109,115,119],"effect":[111],"adjacency":[114],"Based":[118],"our":[120],"analysis,":[121],"make":[123],"recommendations":[124],"using":[126],"management":[129],"various":[132],"application":[133]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
