1. Divertible protocols and atomic proxy cryptography;Blaze,1998
2. Attribute-based publishing with hidden credentials and hidden policies;Kapadia,2007
3. Scalable solutions for secure group communications;Mukherjee;Comput. Netw.,2007
4. Secure multicast in dynamic environments;Huang;Comput. Netw.,2007
5. Achieving secure, scalable, and fine-grained data access control in cloud computing;Yu,2010