B. Daghighi, M. L. Kiah, S. Shamshirband, and M. H. Rehman, Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges, Journal of Network and Computer Applications, vol.50, pp.50-51, 2015.
DOI : 10.1016/j.jnca.2014.11.001

J. Mitola, M. Jr, and G. Q. , Cognitive radio: making software radios more personal, IEEE Personal Communications, vol.6, issue.4, pp.13-18, 1999.
DOI : 10.1109/98.788210

D. Grandblaise, D. Bourse, K. Moessner, and P. Leaves, Dynamic spectrum allocation (DSA) and reconfigurability, IEEE Communications Magazine, pp.72-81, 2004.

A. M. Wyglinski, M. Nekovee, and T. Hou, Cognitive radio communications and networks: principles and practice, 2009.

A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De-maglie et al., Mobile App Security Analysis with the MAVeriC Static Analysis Module, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.103-119, 2014.

S. Kiyomoto, K. Fukushima, and Y. Miyake, Design of categorization mechanism for disaster-information-gathering system, J Wirel Mob Netw Ubiquitous Comput Dependable Appl, vol.3, issue.4, pp.2012-2033

B. Pokri, S. Kro, D. Draji, M. Pokri, V. Rajs et al., Augmented Reality Enabled IoT Services for Environmental Monitoring Utilising Serious Gaming Concept, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.37-55, 2015.

X. Zou, B. Ramamurthy, and S. S. Magliveras, Secure group communications over data networks, 2007.

P. C. Lee, C. S. Lui, and K. Y. Yau, Distributed collaborative key agreement and authentication protocols for dynamic peer Groups, IEEE/ACM Transactions on Networking, vol.14, issue.2, pp.263-276, 2006.
DOI : 10.1109/TNET.2006.872575

Y. Kim, A. Perrig, and G. Tsudik, Simple and fault-tolerance key agreement for dynamic collaborative groups, 7th ACM Conference on Computer and Communications Security, pp.235-244, 2000.
DOI : 10.1145/352600.352638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.9154

W. Diffie and M. E. Hellman, New directions in cryptography. Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/tit.1976.1055638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720

C. Boyd and A. Mathuria, Protocols for authentication and key establishment, 2003.
DOI : 10.1007/978-3-662-09527-0

H. Rif-pous and C. Garrigues, Authenticating hard decision sensing reports in cognitive radio networks, Computer Networks, vol.56, issue.2, pp.566-576, 2012.
DOI : 10.1016/j.comnet.2011.10.006

A. T. Sherman and D. A. Mcgrew, Key establishment in large dynamic groups using one-way function trees. Software Engineering, IEEE Transactions on, vol.29, issue.5, pp.444-458, 2003.
DOI : 10.1109/tse.2003.1199073

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.2372

P. Vijayakumar, S. Bose, A. Kannan, and S. S. Subramanian, An effective key distribution protocol for secure multicast communication, ICoAC 2010, pp.102-107, 2010.
DOI : 10.1109/ICOAC.2010.5725367

F. Zhou, J. Xu, L. Lin, and H. Xu, Multicast Key Management Scheme Based on TOFT, 2008 10th IEEE International Conference on High Performance Computing and Communications, pp.1030-1035, 2008.
DOI : 10.1109/HPCC.2008.90

J. C. Lin, F. Lai, and H. C. Lee, Efficient group key management protocol with one-way key derivation, IEEE Conference on Local Computer Networks, pp.336-343, 2005.

A. Sulaiman, S. K. Raja, and S. H. Park, Improving scalability in vehicular communication using one-way hash chain method, Ad Hoc Networks, vol.11, issue.8, pp.2526-2540, 2013.
DOI : 10.1016/j.adhoc.2013.05.017

V. Odelu, A. K. Das, and A. Goswami, A secure effective key management scheme for dynamic access control in a large leaf class hierarchy, Information Sciences, vol.269, pp.270-285, 2014.
DOI : 10.1016/j.ins.2013.10.022

Q. Mao, C. C. Chang, L. Harn, and S. C. Chang, An image-based key agreement protocol using the morphing technique. Multimedia Tools and Applications, pp.74-32073229, 2013.

S. H. Islam, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, Information Sciences, vol.312, pp.312-104, 2015.
DOI : 10.1016/j.ins.2015.03.050

B. Li, Y. Yang, Z. Lu, B. Yuan, and T. Long, Secure distributed batch rekeying algorithm for dynamic group, Communication Technology (ICCT), 2012 IEEE 14th International Conference on, pp.664-667, 2012.

P. Rogaway and T. Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, Fast Software Encryption, pp.371-388, 2004.
DOI : 10.1007/978-3-540-25937-4_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.6200

J. Zhang, B. Li, C. X. Chen, P. Tao, and S. Q. Yang, EDKAS: A Efficient Distributed Key Agreement Scheme Using One Way Function Trees for Dynamic Collaborative Groups, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications", pp.1215-1222, 2006.
DOI : 10.1109/CESA.2006.313506

M. Li, Z. Feng, N. Zang, R. L. Graham, and F. F. Yao, Approximately optimal trees for group key management with batch updates, Theoretical Computer Science, issue.11, pp.410-1013, 2009.
DOI : 10.1016/j.tcs.2008.10.034

URL : http://doi.org/10.1016/j.tcs.2008.10.034