1. Srinivasan R, Vaidehi V, Rajaraman R, Kanagaraj S (2010) Secure group key management scheme for multicast networks. Int J Netw Sec 11(1):33–38
2. Real User Corporation: Passfaces.
www.passfaces.com
3. Dhamija R, Perrig A (2000)Deja vu: a user study using images for authentication. Proc 9th USENIX Sec Sym
4. Mingyan L, Poovendran R, Berenstein C (2002) Design of Secure Multicast key Management Schemes with Communication Budget Constraint. IEEE Commun Lett 6(3):108–110.
https://doi.org/10.1109/4234.991148
5. Pitipatana S, Nirwan A (2007) Elliptic curve cryptosystem-based group key Management for Secure Group Communications, Proc IEEE Military Commun Conf Orlando, USA: 1–6