D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme, Lecture Notes in Computer Science, vol.2442, pp.47-60, 2002.
DOI : 10.1007/3-540-45708-9_4

C. Heuberger, Hwang's Quasi-Power-Theorem in Dimension Two, Quaestiones Mathematicae, vol.30, issue.4, pp.507-512, 2007.
DOI : 10.2989/16073600709486217

H. K. Hwang, On Convergence Rates in the Central Limit Theorems for Combinatorial Structures, European Journal of Combinatorics, vol.19, issue.3, pp.329-343, 1998.
DOI : 10.1006/eujc.1997.0179

D. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001, pp.374-391, 2003.
DOI : 10.1007/3-540-44647-8_3

E. C. Park and I. F. Blake, On the mean number of encryptions for tree-based broadcast encryption schemes, Journal of Discrete Algorithms, vol.4, issue.2, pp.215-238, 2006.
DOI : 10.1016/j.jda.2005.03.003

D. Wallner, E. Harder, and R. Agee, Key management for multicast: Issues and architectures, 1998.
DOI : 10.17487/rfc2627

C. K. Wong, M. Gouda, and S. Lam, Secure group communications using key graphs, SIGCOMM 1998, pp.68-79, 1998.