[1] Wong C K, Gouda M, Lam S S. Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30. [2] Dierks T, Rescorla E. RFC4346—2006, The transport layer security (TLS) protocol version 1.1[S]. USA: IETF, 2006: 24-51. [3] Waldvogel M, Caronni G, Sun D. The versaKey framework: versatile group key management[J]. IEEE Journal on Selected Areas in Communications, 1999, 17(9): 1614-1631. [4] Canetti R, Garay J, Itkis G. Multicast security: a taxonomy and some efficient construction//Proceedings of the INFOCOM. New York: IEEE Press, 1999: 708-716. [5] Rafaeli S, Mathy L, Hutchison D. Draft-rafaeli-lkh2-00-2002, LKH+2: An improvement on the LKH+ algorithm for removal operations[S]. USA: IETF, 2002: 8-11. [6] Sherman A T, McGrew D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458. [7] Duma C, Shahmehri N, Lambrix P. A hybrid key tree scheme for multicast to balance security and efficiency requirements//Proceedings of the WETICE'03. Linz: IEEE Press, 2003: 208-213. [8] Ghanem S M, Abdel-Wahab H. A simple XOR-based technique for distributing group key in secure multicasting//Proceedings of the ISCC 2000. Antibes: IEEE Press, 2000: 166-171. [9] Lin Jenchiun, Tzeng Chienhua, Lai Feipei. Optimizing centralized secure group communications with binary key tree recomposition//Proceedings of the AINA'04. Fukuoka: IEEE Press, 2004: 202-207. [10] Zhu Wentao. Optimizing the tree structure in secure multicast key management[J]. Communications Letters, IEEE, 2005, 9(5): 477-479. [11] Onen M, Molva R. Reliable group rekeying with a customer perspective//Proceedings of the GLOBECOM'04. Dallas: IEEE Press, 2004: 2072-2076. [12] Bruce Schneier. Applied cryptography[M]. Second Edition. USA: John Wiley & Sons, Inc, 1996: 359-383. |