{"id":"https://openalex.org/W1490949308","doi":"https://doi.org/10.1109/icon.2003.1266222","title":"A novel dynamic key management scheme for secure multicasting","display_name":"A novel dynamic key management scheme for secure multicasting","publication_year":2004,"publication_date":"2004-06-30","ids":{"openalex":"https://openalex.org/W1490949308","doi":"https://doi.org/10.1109/icon.2003.1266222","mag":"1490949308"},"language":"en","primary_location":{"id":"doi:10.1109/icon.2003.1266222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icon.2003.1266222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.uow.edu.au/infopapers/268","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100648249","display_name":"Junqi Zhang","orcid":"https://orcid.org/0000-0001-8736-5253"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Junqi Zhang","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, Australia","Dept of Comput., Macquarie Univ., Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"Dept of Comput., Macquarie Univ., Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"V. Varadharajan","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, Australia","Dept of Comput., Macquarie Univ., Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"Dept of Comput., Macquarie Univ., Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","University of Wollongong"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"University of Wollongong","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100648249"],"corresponding_institution_ids":["https://openalex.org/I99043593"],"apc_list":null,"apc_paid":null,"fwci":0.2491,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.62857265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2094","issue":null,"first_page":"391","last_page":"395"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.8574456572532654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7448301911354065},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7060421705245972},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6388601064682007},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6327738165855408},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6220885515213013},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.5033983588218689},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.4888760447502136},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48164406418800354},{"id":"https://openalex.org/keywords/xcast","display_name":"Xcast","score":0.47889962792396545},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4640803337097168},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.43919575214385986},{"id":"https://openalex.org/keywords/protocol-independent-multicast","display_name":"Protocol Independent Multicast","score":0.4275647699832916},{"id":"https://openalex.org/keywords/ip-multicast","display_name":"IP multicast","score":0.41630828380584717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36779123544692993},{"id":"https://openalex.org/keywords/pragmatic-general-multicast","display_name":"Pragmatic General Multicast","score":0.31810420751571655},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13322588801383972},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08506947755813599}],"concepts":[{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.8574456572532654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7448301911354065},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7060421705245972},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6388601064682007},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6327738165855408},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6220885515213013},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.5033983588218689},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.4888760447502136},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48164406418800354},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.47889962792396545},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4640803337097168},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.43919575214385986},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.4275647699832916},{"id":"https://openalex.org/C150329594","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"IP multicast","level":3,"score":0.41630828380584717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36779123544692993},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.31810420751571655},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13322588801383972},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08506947755813599},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icon.2003.1266222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icon.2003.1266222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-1266","is_oa":true,"landing_page_url":"https://ro.uow.edu.au/infopapers/268","pdf_url":"https://ro.uow.edu.au/infopapers/268","source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"},{"id":"pmh:oai:figshare.com:article/27706917","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:ro.uow.edu.au:infopapers-1266","is_oa":true,"landing_page_url":"https://ro.uow.edu.au/infopapers/268","pdf_url":"https://ro.uow.edu.au/infopapers/268","source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"},"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1490949308.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1492973630","https://openalex.org/W1508813780","https://openalex.org/W1545031386","https://openalex.org/W1601260598","https://openalex.org/W1605724471","https://openalex.org/W1649377807","https://openalex.org/W2022460153","https://openalex.org/W2071470557","https://openalex.org/W2105514582","https://openalex.org/W2108792938","https://openalex.org/W2123274186","https://openalex.org/W2127275895","https://openalex.org/W2143545186","https://openalex.org/W2154161615","https://openalex.org/W2159945176","https://openalex.org/W2165482045","https://openalex.org/W2169383992","https://openalex.org/W4255894042","https://openalex.org/W6630673747","https://openalex.org/W6636759477","https://openalex.org/W6684617066"],"related_works":["https://openalex.org/W3147332615","https://openalex.org/W2350292332","https://openalex.org/W1527943431","https://openalex.org/W1989822316","https://openalex.org/W2392241939","https://openalex.org/W2361918320","https://openalex.org/W283993111","https://openalex.org/W2391223326","https://openalex.org/W2382754013","https://openalex.org/W2624648444"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2,9,63],"new":[3],"secure":[4],"multicast":[5,29],"scheme":[6,16,52],"based":[7],"on":[8],"novel":[10],"hybrid":[11],"key":[12,49],"distribution":[13],"scheme.":[14],"This":[15],"meets":[17],"the":[18,22,44],"requirements":[19],"described":[20],"in":[21,37,43],"Internet":[23],"Engineering":[24],"Task":[25],"Force":[26],"(IETF)":[27],"for":[28,56],"security":[30,38],"architecture.":[31],"It":[32],"exhibits":[33],"certain":[34],"unique":[35],"advantages":[36],"services":[39],"over":[40],"existing":[41],"schemes":[42],"area":[45],"of":[46],"dynamic":[47],"group":[48,57,64],"management.":[50],"Our":[51],"allows":[53],"efficient":[54],"mechanisms":[55],"members":[58],"to":[59],"join":[60],"and":[61],"leave":[62],"frequently.":[65]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
