1. Lecture Notes in Computer Science;M Barbosa,2009
2. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption, September 2000. http://cseweb.ucsd.edu/~mihir/papers/sym-enc.html
3. Bohli, J.-M., Müller-Quade, J., Röhrich, S.: Long-term secure key establishment. In: Schmidt, A.U., Kreutzer, M., Accorsi, R. (eds.) Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security, pp. 87–95. Nova Science Publishers (2007)
4. Bohli, J.-M., Vasco, M.I.G., Steinwandt, R.: Secure group key establishment revisited. Int. J. Inf. Secur. 6(4), 243–254 (2007)
5. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of 8th ACM Conference on Computer and Communications Security, CCS 2001, pp. 255–264. ACM (2001)