1. Datta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self healing key distribution with revocation in wireless ad hoc networks. Ad hoc Netw. 8(6), 597–613 (2010). http://doi.org/10.1016/j.adhc.2009.11.005
2. Suganyadevi, D., Padmavathi, G.: Energy efficient CBMT for secure multicast key distribution in mobile and adhoc networks. Procedia Comput. Sci. 2, 248–255 (2010)
3. Zhou, J., Ou, Y.: Key tree and Chinese reminder theorem based group key distribution scheme. In: Hun, A., Chang, S.L. (eds.): Algorithms and Architectures for Parallel Processing, ICA3PP2009(LNCS), pp. 254–265 (2009)
4. Planisamy, V., Annadurai, P.: Secure group communication using multicast key distribution scheme in adhoc networks. IJCA 1(25), 86–91 (2010) ( www.ijcaonline.com )
5. Vijaykumar, P., Bose, S., Kannan., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. KSII Trans. Internet Inf. syst. 7, 878–894 (2013). https://doi.org/10.3837/tiis.2013.04.016