[1] Li X S, Yang Y R, Gouda M G, et al. Batch rekeying for secure group communications//ACM SIGCOMM 2001. : ACM, 2001: 525-534. [2] Zhang X B, Lam S S, Lee D Y, et al. Protocol design for scalable and reliable group rekeying[J]. IEEE/ACM Trans on Networking, 2003, 11(6): 908-922. [3] Prathap P M J, Vasudevan V. Revised variable length interval batch rekeying with balanced key tree management for secure multicast communications[J]. International Journal of Computer Science and Network Security, 2008, 8(4): 232-241. [4] Li Minming, Feng Ze, Zang Nan, et al. Approximately optimal trees for group key management with batch updates[J]. Theoretical Computer Science, 2009, 410(11): 1013-1021. [5] Gu Xiaozhuo, Yang Jianzu, Lan Julong, et al. Huffman-based join-exit-tree scheme for contributory key management[J]. Computer and Security, 2009, 28(1): 29-39. [6] Ng W H D, Howarth M, Sun Z, et al. Dynamic balanced key tree management for secure multicast communications[J]. IEEE Trans on Computers, 2007, 56(5): 590-605. [7] 李保红, 侯义斌, 赵银亮. 安全多播中密钥更新机制的性能优化[J]. 西安交通大学学报, 2004, 38(10): 1053-1056. Li Baohong, Hou Yibin, Zhao Yinliang. Performance optimization for rekeying mechanism in secure multicast[J]. Journal of Xian Jiaotong University, 2004, 38(10): 1053-1056. [8] 李洋, 辛阳, 高雪松, 等. 运用PRF和XOR运算的安全组播密钥更新改进方案[J]. 北京邮电大学学报, 2008, 31(1): 92-96. Li Yang, Xin Yang, Gao Xuesong, et al. Optimized rekeying solution for secure multicast using PRF and XOR operation[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(1): 92-96. |