1. C.K. Wong, M. Gouda and S.S. Lam, Secure group communications using key graphs, IEEE/ACM Transactions on Networking 8(1) (Feb. 2000), 16–30.
2. X. Li, Y.R. Yang, M.G. Gouda and S.S. Lam, Batch rekeying for secure group communications, in: Proceedings of the Tenth International Conference on World Wide Web Hong Kong (July 2001), pp. 525–534.
3. A. Perrig and J.D. Tygar, Secure Broadcast Communication in Wired and Wireless Networks (Kluwer Academic Publishers, 2003).
4. S. Setia, S. Koussih, S. Jajodia and E. Harder, Kronos: A scalable group rekeying approach for secure multicast, in: IEEE Symposium on Security and Privacy (Oakland, CA, May 2000), pp. 215–228.
5. S. Zhu, S. Setia and S. Jajodia, Performance optimizations for group key management schemes, in: Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (Providence, Rhode Island, May 2003), pp. 163–171.