1. Judge, P., M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. – Network, IEEE, Vol. 17, 2003, pp. 30-36.10.1109/MNET.2003.1174175
2. Challal, Y., H. Seba. Group Key Management Protocols: A Novel Taxonomy. – Enformatika, International Journal of Information Technology, Vol. 2, 2005.
3. Bibo, J., H. Xiulin. A Survey of Group Key Management. – In: Computer Science and Software Engineering, 2008 International Conference on, 2008, pp. 994-1002.
4. Rafaeli, S., D. Hutchison. A Survey of Key Management for Secure Group Communication. – ACM Computing Surveys, Vol. 35, September 2003, pp. 309-329.10.1145/937503.937506
5. Chiou, G. H., W. T. Chen. Secure Broadcast Using Secure Lock. – IEEE Transactions on Software Engineering, Vol. 15, August 1989, No 8, pp. 929-934.10.1109/32.31350
8. Wallner, D., E. Harder, R. Agee. Key Management for Multicast: Issues and Architecture. National Security Agency, June 1999. – In: RFC 2627.10.17487/rfc2627
10. Wong, C. K., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. – IEEE/ACM Transactions on Networking, Vol. 8, February 2000, No 1, pp. 16-30.10.1109/90.836475
11. Balenson, D., D. Mc Grew, A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Draft-balenson-groupkeymgmtoft-00.txt, February 1999. Internet-Draft.
12. Canetti, R., J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas. Multicast Security: A Taxonomy and Efficient Constructions. – In: Proc. of IEEE INFOCOM, March 1999, pp. 708-716.10.1109/INFCOM.1999.751457
13. Mc Grew, D. A., A. T. Sherma. Key Establishement in Large Dynamic Groups Using One-Way Function Trees. Technical Report TR-0755, World Academy of Science Engeneering and Technology, May 1998.
14. Waldvogel, M., G. Caronni, D. Sun, N. Weiler, B. Plattner. The VersaKey Framework: Versatile Group Key Management. – IEEE Journal on Selected Areas in Communications (Special Issues on Middleware), Vol. 17, August 1999, No 8, pp. 1614-1631.10.1109/49.790485
17. Ballardie, T., I. P. Francis, J. Crowcroft. Core Based Trees: An Architecture for Scalable Inter-Domain Multicast Routing. – In: Proc. of ACM SIGCOMM, 1993, pp. 85-95.
18. DeCleene, B., L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, C. Zhang. Secure Group Communications for Wireless Networks. MILCOM, June 2001.
20. Rafaeli, S., D. Hutchison. Hydra: A Decentralized Group Key Management. – In: 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.10.5753/sbseg.2002.21272
21. Setia, S., S. Koussih, S. Jajodia, E. Harder. Kronos: Ascalable Group Re-Keying Approach for Secure Multicast. – In: IEEE Symposium on Security and Privacy, May 2000.
22. Briscoe, B. MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences. – In: 1st International Workshop on Networked Group Communication, November 1999.10.1007/978-3-540-46703-8_19
23. Dondeti, L. R., S. Mukherjee, A. Samal. Scalable Secure One-to-Many Group Communication Using Dual Encryption. – Computer Communications, Vol. 23, November 2000, No 17, pp. 1681-1701.10.1016/S0140-3664(00)00255-3
25. Ingemarson, D. Tang, C. Wong. A Conference Key Distribution System. – IEEE Transactions on Information Theory, Vol. 28, September 1982, No 5, pp. 714-720.10.1109/TIT.1982.1056542
26. Steiner, M., G. Tsudik, M. Waidner. Diffie-Hellman Key Distribution Extended to Group Communication. – In: 3rd ACM Conference on Computer and Communications Security, March 1996, pp. 31-37.10.1145/238168.238182
27. Diffie, W., M. E. Hellman. New Directions in Cryptography. – IEEE Transactions on Information Theory, Vol. IT-22, November 1976, pp. 644-654.10.1109/TIT.1976.1055638
28. Becker, C., U. Wille. Communication Complexity of Group Key Distribution. – In: 5th ACM Conference on Computerand Communications Security, Nowember 1998.10.1145/288090.288094
31. Dondeti, L., S. Mukherjee, A. Samal. A Distributed Group Key Management Scheme for Secure Many-to-Many Communication. Technical Report PINTL-TR-207-99, 1999.
33. Boyd, C. On Key Agreement and Conference Key Agreement. – In: Information Security and Privacy: Australasian Conference, 1997, LNCS(1270), pp. 294-302.
34. Burmester, M., Y. Desmedt. A Secure and Efficient Conference Key Distribution System. – In: EUROCRYP’94, 1994, LNCS(950), pp. 275-286.10.1007/BFb0053443
35. Yan, S., W. Trappe, K. J. R. Liu. An Efficient Key Management Scheme for Secure Wireless Multicast. – In: ICC’02. Communications, 2002, IEEE International Conference on, Vol. 2, 2002, pp. 1236-1240.10.1109/ICC.2002.997047
36. Yan, S., W. Trappe, K. J. R. Liu. Topology-Aware Key Management Schemes for Wireless Multicast. – In: Global Telecommunications Conference, 2003. GLOBECOM’03, Vol. 3, IEEE, 2003, pp. 1471-1475.
37. Lin, L., L. Xueming, C. Yong. HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast. – In: Networking, Architecture, and Storage, 2007. NAS’2007. International Conference on, pp. 109-114.10.1109/NAS.2007.27
38. Yiling, W., L. Phu Dung, B. Srinivasan. Hybrid Group Key Management Scheme for Secure Wireless Multicast. – In: Computer and Information Science, 2007. ICIS’2007. 6th IEEE/ACIS International Conference on, 2007, pp. 346-351.
39. Yiling, W., L. Phu Dung, B. Srinivasan. Efficient Key Management for Secure Wireless Multicast. – In: 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT’08), 2008., pp. 1131-1136.
40. Eidkhani, E., M. Hajyvahabzadeh, S. A. Mortazav, A. N. Pour. CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement. – International Journal of Computer Networks & Communications (IJCNC), Vol. 4, 2012, pp. 107-128.10.5121/ijcnc.2012.4407
42. Hajyvahabzadeh, M., E. Eidkhani, S. A. Mortazavi, A. N. Pour. A New Group Key Management Protocol Using Code for Key Calculation: CKC. – In: International Conference on Information Science and Applications (ICISA’10), 2010, pp. 1-6.
43. Ming-Chin, C., L. Jeng-Farn. MKMS: Multicast Key Management Scheme for Proxy Mobile IPv6 Networks. – In: International Conference on Consumer Electronics, Communications and Networks (CECNet’11), 2011, pp. 1402-1405.
44. Jianfeng, G., Z. Huachun, Z. Hongke, H. Luo. Multicast Extension Support for Proxy MIPv6. – In: Consumer Communications and Networking Conference (CCNC’10), 7th IEEE, 2010, pp. 1-5.
46. Kellil, M., J. C. A. Olivereau, P. Janneteau. Rekeying in Secure Mobile Multicast Communications. United States Patent Application Publications, US 2007/0143600 A1 2007.
47. Kiah, L. M., K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. – In: Future Generation Communication and Networking (FGCN’07), 2007, pp. 100-107.10.1109/FGCN.2007.144
48. Kiah, M. L. M., K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. – International Journal of Security and its Applications, Vol. 2, January 2008, pp. 39-52.10.1109/FGCN.2007.144
49. Kiah, M. L. M., B. Daghighi. An Implementation of Secure Group Communication in a Wireless Environment. – International Journal of Computer and Electrical Engineering, Vol. 4, December 2012.10.7763/IJCEE.2012.V4.618
50. Gharout, S., A. Bouabdallah, M. Kellil, Y. Challal. Key Management with Host Mobility in Dynamic Groups. – In: Proc. of 3rd International Conference on Security of Information and Networks, Taganrog, Rostov-on-Don, Russian Federation, 2010.10.1145/1854099.1854138
51. Gharout, S., A. Bouabdallah, Y. Challal, M. Achemlal. Adaptive Group Key Management Protocol for Wireless Communications. – j-jucs, Vol. 18, May 2012, pp. 874-898.
52. Chung Kei, W., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. –IEEE/ACM Transactions on Networking, Vol. 8, 2000, pp. 16-30.10.1109/90.836475
53. Mapoka, Trust Tshepo. Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey. – International Journal of Computer Applications, Vol. 84, 2013, pp. 28-38.10.5120/14629-2985
54. Zhao, S., R. Kent, A. Aggarwal. A Key Management and Secure Routing Integrated Framework for Mobile Ad Hoc Networks. – Ad Hoc Networks, Vol. 11, 2013, pp. 1046-1061.10.1016/j.adhoc.2012.11.005
55. Abouhogail, Reham Abdellatif. Security Assessment for Key Management in Mobile Ad Hoc Networks. – International Journal of Security and Its Applications, Vol. 8, 2014, No 1, pp. 169-182.10.14257/ijsia.2014.8.1.16