1. ISO/IEC 11770-5:2011, Information technology - Security techniques - Key management - Part 5: Group key management (2011)
2. Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ.-Comput. Inf. Sci. 28(3), 262–275 (2016)
3. Fukushima, K., Kiyomoto, S., Tanaka, T., Sakurai, K.: Optimization of group key management structure with a client join-leave mechanism. J. Inf. Process. 16, 130–141 (2008)
4. Je, D.H., Kim, H.S., Choi, Y.H., Seo, S.W.: Dynamic configuration of batch rekeying interval for secure multicast service. In: 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 26–30. IEEE (2014)
5. Kumar, V., Kumar, R., Pandey, S.K.: A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. J. King Saud Univ.-Comput. Inf. Sci. 32(9), 1081–1094 (2020)