1. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A taxonomy and some efficient constructions”, in IEEE INFOCOM'99, vol. 2, pp. 708–716, 1999.
2. Lect Notes Comput Sci;A. Santis De,1990
3. Y. Desmedt, Y. Frankel, and M. Yung, “Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback”, in IEEE INFOCOM '92, pp. 2045–2054, 1992.
4. F. Fujii, W. Kachen, and K. Kurosawa, “Combinatorial bounds and design of broadcast authentication”, in IEICE Trans., vol. E79-A, no. 4, pp. 502–506, 1996.
5. R. Gennaro and P. Rohatgi, “How to sign digital streams”, in Proc. of Crypto '97, 1997.