1 |
Ng WHD, Howarth M, Sun Z, Cruickshank H. "Dynamic balanced key tree management for secure multicast communications," IEEE Transactions on Computers, Vol. 56, No. 5, pp. 590-605, 2007.
DOI
|
2 |
Lih-Chyau Wuu, Chi-Hsiang Hung, Wen-Chung Kuo, "Group Key Management based on (2,2) Secret Sharing", KSII Transactions on Internet and Information Systems, Vol.8 , No. 3, pp. 1144-1156, 2014.
DOI
|
3 |
L. Harn, C. Lin, "Authenticated group key transfer protocol based on secret sharing," IEEE. Trans. Computers, Vol. 59, No. 6, pp. 842-846, 2010.
DOI
|
4 |
Y. Liu, C. Cheng, J. Cao, T. Jiang, "An improved authenticated group key transfer protocol based on secret sharing," IEEE Trans. Computers, Vol. 62, No. 11, pp. 2335-2336, 2013.
DOI
|
5 |
Harney H, Muckenhirn C, Rivers T, "Group key management protocol(GKMP) architecture," RFC 2094, IETF 1997.
|
6 |
C. Blundo, Luiz A. Frota Mattos, and D.R. Stinson, " Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution", Thoretical Computer Science V. 200, No. 1-2, pp. 313-334, 1998.
DOI
|
7 |
Ng WHD, Cruickshank H, Sun Z. "Scalable balanced batch rekeying for secure group communication," Computers and Security, Vol. 25, No. 4, pp. 265-273, 2006.
DOI
|
8 |
M. Stener, G. Tsydik, M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication", In Proceedings of ACM CCS, pp. 31-37,1996
|
9 |
O. Rodeh, K.P. Briman, D. Dolev, "Optimized Group Rekey for Group Communication Systems", In Proceeding of Network and Distributed Systems Security Symposium, 2000.
|
10 |
Junbeom Hur, Hyunsoo Yoon, "Decentralized Group Key Management for Untrusted Dynamic Networks", Journal of Computing Science and Engineering, Vol. 36, No. 4, pp. 263-275, 2009.
|
11 |
Kwak DW, Kim J., "A decentralized group key management scheme for the decentralized P2P environment," IEEE Communications Letters, Vol. 11, No. 6, pp. 555-557, 2007.
DOI
|
12 |
Thomas Page, "The application of hash chains and hash structures to cryptography", PhD thesis, Citeseer, 2009.
|