Wong C K, Gouda M, Lam S S. Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.
[2]
Dierks T, Rescorla E. RFC4346—2006, The transport layer security (TLS) protocol version 1.1[S]. USA: IETF, 2006: 24-51.
[3]
Waldvogel M, Caronni G, Sun D. The versaKey framework: versatile group key management[J]. IEEE Journal on Selected Areas in Communications, 1999, 17(9): 1614-1631.
[4]
Canetti R, Garay J, Itkis G. Multicast security: a taxonomy and some efficient construction//Proceedings of the INFOCOM. New York: IEEE Press, 1999: 708-716.
[5]
Rafaeli S, Mathy L, Hutchison D. Draft-rafaeli-lkh2-00-2002, LKH+2: An improvement on the LKH+ algorithm for removal operations[S]. USA: IETF, 2002: 8-11.
[6]
Sherman A T, McGrew D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458.
[7]
Duma C, Shahmehri N, Lambrix P. A hybrid key tree scheme for multicast to balance security and efficiency requirements//Proceedings of the WETICE'03. Linz: IEEE Press, 2003: 208-213.
[8]
Ghanem S M, Abdel-Wahab H. A simple XOR-based technique for distributing group key in secure multicasting//Proceedings of the ISCC 2000. Antibes: IEEE Press, 2000: 166-171.
[9]
Lin Jenchiun, Tzeng Chienhua, Lai Feipei. Optimizing centralized secure group communications with binary key tree recomposition//Proceedings of the AINA'04. Fukuoka: IEEE Press, 2004: 202-207.
[10]
Zhu Wentao. Optimizing the tree structure in secure multicast key management[J]. Communications Letters, IEEE, 2005, 9(5): 477-479.
[11]
Onen M, Molva R. Reliable group rekeying with a customer perspective//Proceedings of the GLOBECOM'04. Dallas: IEEE Press, 2004: 2072-2076.
[12]
Bruce Schneier. Applied cryptography[M]. Second Edition. USA: John Wiley & Sons, Inc, 1996: 359-383.