1 |
Ateniese G, Steiner M, Tsudik G. "New multiparty authentication services and key agreement protocols, " IEEE Journal on Selected Areas in Communications , Vol. 18, No.4, pp.628-639, April, 2000.
DOI
ScienceOn
|
2 |
Daza V, Herranz J, Saez G. "On the computational security of a distributed key distribution scheme," IEEE Transactions on Computers, Vol.57, No.8, pp.1087-1097, August, 2008.
DOI
ScienceOn
|
3 |
Pham T, Watters PA. "The efficiency of periodic rekeying in dynamic group key management," in Proc. of 4th European Conf. on Universal Multiservice Networks, pp.425-432, February, 2007.
|
4 |
Shamir A. "How to share a secret," Communications of the ACM, Vol.22, No.11, pp. 612-613, November, 1979.
DOI
ScienceOn
|
5 |
Sun Y, Liu KJR. "Hierarchical group access control for secure multicast communications," IEEE/ACM Transactions on Networking, Vol.15, No.6, pp.1514-1526, December, 2007.
DOI
ScienceOn
|
6 |
Wuu LC, Chen HC. "A scalable framework for secure group communication," in Proc. of First International Conference on Networking-Part 2, pp.225-238, 2001.
|
7 |
Xu L, Huang C. "Computation-efficient multicast key distribution," IEEE Transactions on Parallel and Distributed Systems, Vol.19, No.5, pp.577-587, May, 2008.
DOI
ScienceOn
|
8 |
Yi X. "Authenticated key agreement in dynamic peer groups," Journal of Theoretical Computer Science, Vol.326, No.1-3, pp.363-382, October, 2004.
DOI
ScienceOn
|
9 |
Yu W, Sun Y, Liu KJR. "Optimizing rekeying cost for contributory group key agreement schemes," IEEE Transactions on Dependable and Secure Computing, Vol.4, No.3, pp.228-242, 2007.
DOI
ScienceOn
|
10 |
Je DH, Lee JS, Park Y, Seo SW. "Computation-and-storage-efficient key tree management protocol for secure multicast communications," Computer Communications, Vol.33, No.2, pp.136-148, 2010.
DOI
ScienceOn
|
11 |
Kulkarni SS, Bruhadeshwar B. "Key-update distribution in secure group communication," Computer Communications, Vol.33, No.6, pp.689-705, April, 2010.
DOI
ScienceOn
|
12 |
Wu W, Li M, Chen E. "Optimal tree structures for group key tree management considering insertion and deletion cost," Theoretical Computer Science, Vol.410, No.27-29, pp.2619-2631, June, 2009.
DOI
|
13 |
Harney H, Muckenhirn C, Rivers T. "Group key management protocol (GKMP) architecture," RFC 2094, IETF 1997.
|
14 |
Naranjo JAM, Antequera N, Casado LG, López-Ramos JA. "A suite of algorithms for key distribution and authentication in centralized secure multicast environments," Journal of Computational and Applied Mathematics, Vol.236, No.12, pp.3042-3051, June, 2012.
DOI
ScienceOn
|
15 |
Adusumilli P, Zou X, and Ramamurthy B., "DGKD: distributed group key distribution with authentication capability," in Proc. of the IEEE Workshop on Information Assurance and Security, pp. 286-293, June 15-17, 2005.
|
16 |
Harn L, Lin C. "Authenticated group key transfer protocol based on secret sharing," IEEE Transactions on Computers, Vol.59, No.6, pp.842-846, June, 2010.
DOI
ScienceOn
|
17 |
Kwak DW, Kim J. "A decentralized group key management scheme for the decentralized P2P environment," IEEE Communications Letters, Vol.11, No.6, pp.555-557, June, 2007.
DOI
ScienceOn
|
18 |
Ng WHD, Cruickshank H, Sun Z. "Scalable balanced batch rekeying for secure group communication," Computers and Security, Vol.25, No.4, pp.265-273, June, 2006.
DOI
ScienceOn
|
19 |
Ng WHD, Howarth M, Sun Z, Cruickshank H. "Dynamic balanced key tree management for secure multicast communications," IEEE Transactions on Computers, Vol.56, No.5, pp.590-605, May, 2007.
DOI
ScienceOn
|
20 |
Parvatha Varthini B, Valli S. "Generation of group key using enhanced one way function tree group rekey protocol," in Proc. of Int. Conf. on Computing: Theory and Applications, pp.176-181, March 5-7, 2007.
|