{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1362262943585181568.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1007/3-540-48071-4_33"}},{"identifier":{"@type":"URI","@value":"http://link.springer.com/content/pdf/10.1007/3-540-48071-4_33"}}],"dc:title":[{"@value":"Perfectly-Secure Key Distribution for Dynamic Conferences"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1382262943585181571","@type":"Researcher","foaf:name":[{"@value":"Carlo Blundo"}]},{"@id":"https://cir.nii.ac.jp/crid/1382262943585181573","@type":"Researcher","foaf:name":[{"@value":"Alfredo De Santis"}]},{"@id":"https://cir.nii.ac.jp/crid/1382262943585181568","@type":"Researcher","foaf:name":[{"@value":"Amir Herzberg"}]},{"@id":"https://cir.nii.ac.jp/crid/1382262943585181570","@type":"Researcher","foaf:name":[{"@value":"Shay Kutten"}]},{"@id":"https://cir.nii.ac.jp/crid/1382262943585181572","@type":"Researcher","foaf:name":[{"@value":"Ugo Vaccaro"}]},{"@id":"https://cir.nii.ac.jp/crid/1382262943585181569","@type":"Researcher","foaf:name":[{"@value":"Moti Yung"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"03029743"},{"@type":"ISBN","@value":"9783540573401"},{"@type":"ISBN","@value":"9783540480716"}],"prism:publicationName":[{"@value":"Lecture Notes in Computer Science"}],"dc:publisher":[{"@value":"Springer Berlin Heidelberg"}],"prism:publicationDate":"1993","prism:startingPage":"471","prism:endingPage":"486"},"reviewed":"false","url":[{"@id":"http://link.springer.com/content/pdf/10.1007/3-540-48071-4_33"}],"createdAt":"2007-08-05","modifiedAt":"2019-05-01","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050845762468593408","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Self-healing wireless sensor networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1360285705531790976","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001206309961856","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001206310427392","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1390013795251192960","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Multi-Designated Receiver Authentication Codes: Models and Constructions"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1007/3-540-48071-4_33"},{"@type":"CROSSREF","@value":"10.1587/transfun.e99.a.1097_references_DOI_4YfII9FPpBD9lctHaqwvbDrUHXd"},{"@type":"CROSSREF","@value":"10.1007/978-3-319-26059-4_27_references_DOI_4YfII9FPpBD9lctHaqwvbDrUHXd"},{"@type":"CROSSREF","@value":"10.1587/transfun.2022tap0015_references_DOI_4YfII9FPpBD9lctHaqwvbDrUHXd"},{"@type":"CROSSREF","@value":"10.1002/cpe.3434_references_DOI_4YfII9FPpBD9lctHaqwvbDrUHXd"},{"@type":"CROSSREF","@value":"10.1587/transfun.e97.a.2662_references_DOI_4YfII9FPpBD9lctHaqwvbDrUHXd"}]}