1. Armitage, G. (1997). “IP Multicasting over ATM Networks”. IEEE Journal on Selected Areas in Communications, 15(3):445–157.
2. Berkovits, S. (1991). “How To Broadcast A Secret”. Advances in Cryptology — EUROCRYPT ’91, Lecture Notes in Computer Science, LNCS, 547:535–541.
3. Lecture Notes in Computer Science;M Burmester,1994
4. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., and Pinkas, B. (1999). “Multicast Security: A Taxonomy and Some Efficient Constructions”. Proceedings oflNFOCOMM ’99.
5. Chiou, G. and Chen, W. (1989). “Secure Broadcasting Using the Secure Lock”. IEEE Transac tions on Software Engineering, 15(8).