[1. Judge, P., M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. – Network, IEEE, Vol. 17, 2003, pp. 30-36.10.1109/MNET.2003.1174175]Search in Google Scholar
[2. Challal, Y., H. Seba. Group Key Management Protocols: A Novel Taxonomy. – Enformatika, International Journal of Information Technology, Vol. 2, 2005.]Search in Google Scholar
[3. Bibo, J., H. Xiulin. A Survey of Group Key Management. – In: Computer Science and Software Engineering, 2008 International Conference on, 2008, pp. 994-1002.]Search in Google Scholar
[4. Rafaeli, S., D. Hutchison. A Survey of Key Management for Secure Group Communication. – ACM Computing Surveys, Vol. 35, September 2003, pp. 309-329.10.1145/937503.937506]Search in Google Scholar
[5. Chiou, G. H., W. T. Chen. Secure Broadcast Using Secure Lock. – IEEE Transactions on Software Engineering, Vol. 15, August 1989, No 8, pp. 929-934.10.1109/32.31350]Search in Google Scholar
[6. Harney, H., C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture, July 1997. – In: RFC 2093.10.17487/rfc2094]Search in Google Scholar
[7. Harney, H., C. Muckenhirn. Group Key Management Protocol (GKMP) Specification, July 1997. – In: RFC 2094.10.17487/rfc2093]Search in Google Scholar
[8. Wallner, D., E. Harder, R. Agee. Key Management for Multicast: Issues and Architecture. National Security Agency, June 1999. – In: RFC 2627.10.17487/rfc2627]Search in Google Scholar
[9. Wong, C. K., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. – In: Proc. of ACM SIGCOMM, 1998.10.1145/285237.285260]Search in Google Scholar
[10. Wong, C. K., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. – IEEE/ACM Transactions on Networking, Vol. 8, February 2000, No 1, pp. 16-30.10.1109/90.836475]Search in Google Scholar
[11. Balenson, D., D. Mc Grew, A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Draft-balenson-groupkeymgmtoft-00.txt, February 1999. Internet-Draft.]Search in Google Scholar
[12. Canetti, R., J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas. Multicast Security: A Taxonomy and Efficient Constructions. – In: Proc. of IEEE INFOCOM, March 1999, pp. 708-716.10.1109/INFCOM.1999.751457]Search in Google Scholar
[13. Mc Grew, D. A., A. T. Sherma. Key Establishement in Large Dynamic Groups Using One-Way Function Trees. Technical Report TR-0755, World Academy of Science Engeneering and Technology, May 1998.]Search in Google Scholar
[14. Waldvogel, M., G. Caronni, D. Sun, N. Weiler, B. Plattner. The VersaKey Framework: Versatile Group Key Management. – IEEE Journal on Selected Areas in Communications (Special Issues on Middleware), Vol. 17, August 1999, No 8, pp. 1614-1631.10.1109/49.790485]Search in Google Scholar
[15. Ballardie, A. Scalable Multicast Key Distribution. May 1996. – In: RFC 1949.10.17487/rfc1949]Search in Google Scholar
[16. Ballardie, A. Core Based Trees (CBT Version 2) Multicast Routing Protocol Specification, September 1997. – In: RFC 2189.10.17487/rfc2189]Search in Google Scholar
[17. Ballardie, T., I. P. Francis, J. Crowcroft. Core Based Trees: An Architecture for Scalable Inter-Domain Multicast Routing. – In: Proc. of ACM SIGCOMM, 1993, pp. 85-95.]Search in Google Scholar
[18. DeCleene, B., L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, C. Zhang. Secure Group Communications for Wireless Networks. MILCOM, June 2001.]Search in Google Scholar
[19. Hardjono, T., B. Cain, I. Monga. Intra-Domain Group Key Management for Multicast Security. IETF Internet Draft, September 2000.]Search in Google Scholar
[20. Rafaeli, S., D. Hutchison. Hydra: A Decentralized Group Key Management. – In: 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.10.5753/sbseg.2002.21272]Search in Google Scholar
[21. Setia, S., S. Koussih, S. Jajodia, E. Harder. Kronos: Ascalable Group Re-Keying Approach for Secure Multicast. – In: IEEE Symposium on Security and Privacy, May 2000.]Search in Google Scholar
[22. Briscoe, B. MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences. – In: 1st International Workshop on Networked Group Communication, November 1999.10.1007/978-3-540-46703-8_19]Search in Google Scholar
[23. Dondeti, L. R., S. Mukherjee, A. Samal. Scalable Secure One-to-Many Group Communication Using Dual Encryption. – Computer Communications, Vol. 23, November 2000, No 17, pp. 1681-1701.10.1016/S0140-3664(00)00255-3]Search in Google Scholar
[24. Dondeti, L. R., S. Mukherjee, A. Samal. Comparison of Hierarchical Key Distribution Schemes. – In: IEEE Globcom Global Internet Symposium, 1999.]Search in Google Scholar
[25. Ingemarson, D. Tang, C. Wong. A Conference Key Distribution System. – IEEE Transactions on Information Theory, Vol. 28, September 1982, No 5, pp. 714-720.10.1109/TIT.1982.1056542]Search in Google Scholar
[26. Steiner, M., G. Tsudik, M. Waidner. Diffie-Hellman Key Distribution Extended to Group Communication. – In: 3rd ACM Conference on Computer and Communications Security, March 1996, pp. 31-37.10.1145/238168.238182]Search in Google Scholar
[27. Diffie, W., M. E. Hellman. New Directions in Cryptography. – IEEE Transactions on Information Theory, Vol. IT-22, November 1976, pp. 644-654.10.1109/TIT.1976.1055638]Search in Google Scholar
[28. Becker, C., U. Wille. Communication Complexity of Group Key Distribution. – In: 5th ACM Conference on Computerand Communications Security, Nowember 1998.10.1145/288090.288094]Search in Google Scholar
[29. Kim, Y., A. Perrig, G. Tsudik. Communication-Efficient Group Key Agreement. – In: Proc. of IFIP SEC, June 2001.10.1007/0-306-46998-7_16]Search in Google Scholar
[30. Rodeh, O., K. Birman, D. Dolev. Optimized Group Rekey for Group Communication Systems. – Network and Distributed System Security, February 2000.]Search in Google Scholar
[31. Dondeti, L., S. Mukherjee, A. Samal. A Distributed Group Key Management Scheme for Secure Many-to-Many Communication. Technical Report PINTL-TR-207-99, 1999.]Search in Google Scholar
[32. Fiat, A., M. Naor. Broadcast Encryption. – In: CRYPTO’93, 1993, LNCS(773), pp. 480-491.10.1007/3-540-48329-2_40]Search in Google Scholar
[33. Boyd, C. On Key Agreement and Conference Key Agreement. – In: Information Security and Privacy: Australasian Conference, 1997, LNCS(1270), pp. 294-302.]Search in Google Scholar
[34. Burmester, M., Y. Desmedt. A Secure and Efficient Conference Key Distribution System. – In: EUROCRYP’94, 1994, LNCS(950), pp. 275-286.10.1007/BFb0053443]Search in Google Scholar
[35. Yan, S., W. Trappe, K. J. R. Liu. An Efficient Key Management Scheme for Secure Wireless Multicast. – In: ICC’02. Communications, 2002, IEEE International Conference on, Vol. 2, 2002, pp. 1236-1240.10.1109/ICC.2002.997047]Search in Google Scholar
[36. Yan, S., W. Trappe, K. J. R. Liu. Topology-Aware Key Management Schemes for Wireless Multicast. – In: Global Telecommunications Conference, 2003. GLOBECOM’03, Vol. 3, IEEE, 2003, pp. 1471-1475.]Search in Google Scholar
[37. Lin, L., L. Xueming, C. Yong. HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast. – In: Networking, Architecture, and Storage, 2007. NAS’2007. International Conference on, pp. 109-114.10.1109/NAS.2007.27]Search in Google Scholar
[38. Yiling, W., L. Phu Dung, B. Srinivasan. Hybrid Group Key Management Scheme for Secure Wireless Multicast. – In: Computer and Information Science, 2007. ICIS’2007. 6th IEEE/ACIS International Conference on, 2007, pp. 346-351.]Search in Google Scholar
[39. Yiling, W., L. Phu Dung, B. Srinivasan. Efficient Key Management for Secure Wireless Multicast. – In: 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT’08), 2008., pp. 1131-1136.]Search in Google Scholar
[40. Eidkhani, E., M. Hajyvahabzadeh, S. A. Mortazav, A. N. Pour. CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement. – International Journal of Computer Networks & Communications (IJCNC), Vol. 4, 2012, pp. 107-128.10.5121/ijcnc.2012.4407]Search in Google Scholar
[41. Sandirigama, M., S. Akihiro, M. Noda. Simple and Secure Password Authentication Protocol. – IEICE Trans. Com., Vol. E83-B, 2000, pp. 1363-1365.]Search in Google Scholar
[42. Hajyvahabzadeh, M., E. Eidkhani, S. A. Mortazavi, A. N. Pour. A New Group Key Management Protocol Using Code for Key Calculation: CKC. – In: International Conference on Information Science and Applications (ICISA’10), 2010, pp. 1-6.]Search in Google Scholar
[43. Ming-Chin, C., L. Jeng-Farn. MKMS: Multicast Key Management Scheme for Proxy Mobile IPv6 Networks. – In: International Conference on Consumer Electronics, Communications and Networks (CECNet’11), 2011, pp. 1402-1405.]Search in Google Scholar
[44. Jianfeng, G., Z. Huachun, Z. Hongke, H. Luo. Multicast Extension Support for Proxy MIPv6. – In: Consumer Communications and Networking Conference (CCNC’10), 7th IEEE, 2010, pp. 1-5.]Search in Google Scholar
[45. Gundavelli, S., K. Leung, V. Devarapalli, K. Chowdhury, B. Patil. Proxy Mobile IPv6. RFC 5213, August 2008.]Search in Google Scholar
[46. Kellil, M., J. C. A. Olivereau, P. Janneteau. Rekeying in Secure Mobile Multicast Communications. United States Patent Application Publications, US 2007/0143600 A1 2007.]Search in Google Scholar
[47. Kiah, L. M., K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. – In: Future Generation Communication and Networking (FGCN’07), 2007, pp. 100-107.10.1109/FGCN.2007.144]Search in Google Scholar
[48. Kiah, M. L. M., K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. – International Journal of Security and its Applications, Vol. 2, January 2008, pp. 39-52.10.1109/FGCN.2007.144]Search in Google Scholar
[49. Kiah, M. L. M., B. Daghighi. An Implementation of Secure Group Communication in a Wireless Environment. – International Journal of Computer and Electrical Engineering, Vol. 4, December 2012.10.7763/IJCEE.2012.V4.618]Search in Google Scholar
[50. Gharout, S., A. Bouabdallah, M. Kellil, Y. Challal. Key Management with Host Mobility in Dynamic Groups. – In: Proc. of 3rd International Conference on Security of Information and Networks, Taganrog, Rostov-on-Don, Russian Federation, 2010.10.1145/1854099.1854138]Search in Google Scholar
[51. Gharout, S., A. Bouabdallah, Y. Challal, M. Achemlal. Adaptive Group Key Management Protocol for Wireless Communications. – j-jucs, Vol. 18, May 2012, pp. 874-898.]Search in Google Scholar
[52. Chung Kei, W., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. –IEEE/ACM Transactions on Networking, Vol. 8, 2000, pp. 16-30.10.1109/90.836475]Search in Google Scholar
[53. Mapoka, Trust Tshepo. Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey. – International Journal of Computer Applications, Vol. 84, 2013, pp. 28-38.10.5120/14629-2985]Search in Google Scholar
[54. Zhao, S., R. Kent, A. Aggarwal. A Key Management and Secure Routing Integrated Framework for Mobile Ad Hoc Networks. – Ad Hoc Networks, Vol. 11, 2013, pp. 1046-1061.10.1016/j.adhoc.2012.11.005]Search in Google Scholar
[55. Abouhogail, Reham Abdellatif. Security Assessment for Key Management in Mobile Ad Hoc Networks. – International Journal of Security and Its Applications, Vol. 8, 2014, No 1, pp. 169-182.10.14257/ijsia.2014.8.1.16]Search in Google Scholar