1. G. Ateniese, M. Steiner, G. Tsudik, New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Commun. 18(4), 628–640 (2000)
2. M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, L. Wolf, A cluster-based security architecture for ad hoc networks, in Proceedings of the 23rd IEEE International Conference on Computer Communications, Hong Kong, 2004, pp. 2393–2403
3. K. Becker, U. Wille, Communication complexity of group key distribution, in Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, 1998
4. C. Blundo, P. D’Arco, M. Listo, A new self-healing key distribution scheme, in Proceedings of the IEEE International Symposium on Computers and Communication, Kemer-Antalya, Turkey, 2003, pp. 803–808
5. Lecture Notes in Computer Science;M Burmester,1995