Challal Y, Bouabdallah A, and Seba H. A taxonomy of groupkey management protocols: issues and solutions [J]. Transactionson Engineering, Computing and Technology, 2005,6(2): 5-17.[2]Hardjono T and Dondeti L R. Multicast and Group Security[M]. Norwood, MA: Artech House, INC., 2003: 5-12, 27,29, 94, 104, 107-108, 136-141.[3]Kim Y, Perrig A, and Tsudik G. Group key agreementefficient in communication[J].IEEE Trans. on Computers.2004, 53(7):905-921[4]Menezes A J, Oorschot P van, and Vanstone S 著,胡磊等译.应用密码学手册[M]. 北京:电子工业出版社, 2005: 56, 99, 147,267-268, 529, 534, 542-543, 556.Menezes A J, Oorschot P Van, and Vanstone S, translated byHu Lei et al.. Handbook of Applied Cryptography[M]. Beijing:Publishing House of Electronics Industry, 2005.[5]Mu Y and Varadharajan V. Robust and secure broadcasting[C]. In: INDOCRYPT 2001, Springer-Verlag Berlin Heidelberg,2001, LNCS 2247: 223-231.[6]Chaddoud G and Varadharajan V. Efficient secure groupmanagement for SSM[C]. In: 2004 IEEE International Conferenceon Communications, Piscataway, NJ, USA, 2004:1436-1440.[7]杨军,周贤伟,覃伯平. 对一种基于公钥加密算法的组密钥管理方案的密码分析[J]. 计算机科学, 2006, 33(7): 134-137.Yang Jun, Zhou Xian-wei, and Qin Bo-ping. Cryptanalysis ofa group key management scheme based on a public-key encryptionalgorithm[J]. Computer Science, 2006, 33(7):134-137.[8]谭作文,刘卓军,肖红光. 一个安全公钥广播加密方案[J]. 软件学报, 2005, 16(7): 1333-1343.Tan Zuo-wen, Liu Zhu-jun, and Xiao Hong-guang. A fullypublic key tracing and revocation scheme provably secureagainst adaptive adversary. Journal of Software, 2005, 16(7):1333-1343.[9]Mao W 著,王继林等译. 现代密码学理论与实践[M]. 北京:电子工业出版社, 2004: 34, 41, 173, 188, 215.Mao W, translated by Wang Ji-lin et al.. Modern Cryptography:Theory and Practice[M]. Beijing: Publishing House ofElectronics Industry, 2004: 34, 41, 173, 188, 215.[10]潘承洞,潘承彪. 初等数论(第二版)[M]. 北京:北京大学出版社, 2003: 143, 181-182.Pan Cheng-dong and Pan Cheng-biao. Elementary NumberTheory(Second Edition)[M]. Beijing: Peking University Press,2003: 143, 181-182.[11]Steel G and Bundy A. Attacking group multicast key managementprotocols using coral[J].Electronic Notes in TheoreticalComputer Science.2005, 125(1):125-144[12]Aslan H K. Two-level controllers hierarchy for a scalable anddistributed multicast security protocol[J].Computers Security.2005, 24(5):399-408
|