[1]Amir Y,Kim Y,NitaRotaru C,et al.On the Performance of Group Key Agreement Protocols[J]. ACM Transactions on Information System Security(TISSEC), 2004,7(3):457488.
[2]Kim Y,Perrig A,Tsudik G.TreeBased Group Key Agreement[J]. ACM Transaction on Information System Security, 2004,7(1):6096.
[3]Trappe W, Wang Y, Liu K J R. ResourceAware Conference Key Establishment for Heterogeneous Networks[J]. IEEE/ACM Transaction on Networking, 2005,13(2):134146.
[4]Mao Y, Sun Y, Wu M, et al. JET: Dynamic JoinExitTree Amortization and Scheduling for Contributory Key Management[J]. IEEE/ACM Transaction on Networking, 2006,14(5):11281140.
[5]Sun Y, Liu K J R. Scalable Hierarchical Access Control in Secure Group Communications[C]∥Proc of IEEE INFOCOM’04, 2004:12961306.
[6]Sun Y, Liu K J R. Hierarchical Group Access Control for Secure Multicast Communications[J]. IEEE/ACM Transaction Networking, 2007, 15(6):15141526.
[7]Wang G, Ouyang J, Chen H H, et al. Efficient Group Key Management for MultiPrivileged Groups[J]. Computer Communications, 2007,30(1112):24972509.
[8]Yan J Z,Ma J F,Liu H Y.Key Hierarchies for Hierarchical Access Control in Secure Group Communications[J]. Computer Networks:The International Journal of Computer and Telecommunications Networking, 2009,53(3):353364.
[9]Gu Xiaozhuo, Yang Jianzu, Lan Julong, et al. HuffmanBased JoinExitTree Scheme for Contributory Key Management[J]. Computers & Security, 2009,28(12):2939. |