1. Sakamoto N. An efficient structure for LKH key tree on secure multicast communications. In: Proceedings of IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Las Vegas, 2014. 1–7
2. Teng J K, Wu C K, Tang C M, et al. A strongly secure identity-based authenticated group key exchange protocol. Sci China Inf Sci, 2015, 58: 092108
3. Wong C K, Gouda M, Lam S S. Secure group communications using key graphs. IEEE/ACM Trans Netw, 2000, 8: 16–30
4. Kwak D W, Lee S J, Kim J W, et al. An efficient LKH tree balancing algorithm for group key management. IEEE Commun Lett, 2006, 10: 222–224
5. Liu Z H, Lai Y X, Ren X B. An efficient LKH tree balancing algorithm for group key management. In: Proceedings of International Conference on Control Engineering and Communication Technology, Shenyang, 2012. 1003–1005