1Wong CK, Gouda M, Lam SS. Secure group communications using key graphs. IEEE/ACM Trans. on Networking, 2000,8(1):16-30.
2Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures. RFC 2627, 1999.
3Sherman AT, Mcgrew DA. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. on Software Engineering, 2003,29(5):444-458.
4Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B. The versaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 1999,17(9): 1614-1631.
5Rafaeli S, Mathy L, Hutchison D. LKH+2: An improvement on the LKH+ algorithm for removal operations. Internet draft (work in progress), Internet Eng. Task Force, 2002. http://www.watersprings.org/pub/id/draft-rafaeli-lkh2-00.txt.
6Pegueroles J, Bin W, Soriano M, Rico-Novella F. Group rekeying algorithm using pseudo-random functions and modular reduction.Grid and Cooperative Computing (GCC), Lecture Notes in Computer Science, 2004,3032:875-882.
7Pegueroles J, Rico-Novella F, Hernandez-Serrano J, Soriano M. Improved LKH for batch rekeying in multicast groups. In: Proc. of the IEEE Int'l Conf. on Information Technology Research and Education (ITRE 2003). New Jersey: IEEE Press, 2003. 269-273.
8Selcuk AA, Sidhu D. Probabilistic optimization techniques for multicast key management. Computer Networks, 2002,40(2):219-234.
9Mcgrew D A, Sherman A T. Key Establishment in Large Dynamic Groups Using One-Way Function Trees [R]. Tech Rep No. 0755, Glenwood, Md: TIS Labs at Network Associates, Inc.
10Trappe W, Song J, Poovendran R, et al. Key management and distribution for secure multimedia multicast [J]. IEEE Transactions on Multimedia, 2003, 5(4): 544- 557.