H. Chen, S. Wang, and J. Wen, Packet construction for secure conference call request in ad hoc network systems, Information Sciences, vol.177, issue.24, pp.5598-5610, 2007.
DOI : 10.1016/j.ins.2007.05.026

H. Chen, Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy, Security and Communication Networks, pp.100-107, 2013.
DOI : 10.1002/sec.536

H. Chen, C. Yang, H. Su, C. Wei, and C. Lee, A secure e-mail protocol using ID-based FNS multicast mechanism, Computer Science and Information Systems, vol.11, issue.3, pp.1091-1112, 2014.
DOI : 10.2298/CSIS130924066C

URL : http://doi.org/10.2298/csis130924066c

K. P. Wu, S. J. Ruan, F. Lai, and C. K. Tseng, On Key Distribution in Secure Multicasting, Proceedings of 25th Annual IEEE International Conference on Local Computer Networks, p.208, 2000.

Y. Kim, A. Perrig, and G. Tsudik, Group key agreement efficient in communication, IEEE Transactions on Computers, vol.53, issue.7, pp.905-921, 2001.
DOI : 10.1109/TC.2004.31

Y. Kim, A. Perrig, and G. Tsudik, Tree-based group key agreement, ACM Transactions on Information and System Security, vol.7, issue.1, pp.60-96, 2004.
DOI : 10.1145/984334.984337

A. Fekete, N. Lynch, and A. Shvartsman, Specifying and using a partitionable group communication service, ACM Transactions on Computer Systems, vol.19, issue.2, pp.171-216, 2001.
DOI : 10.1145/377769.377776

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.1012

X. Chen, G. Lenzini, S. Mauw, and J. Pang, Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.55-75, 2013.

S. Craß, T. Dönz, G. Joskowicz, E. Kühn, and A. Marek, Securing a Space-Based Service Architecture with Coordination-Driven Access Control, Journal of Wireless Mobile Networks , Ubiquitous Computing, and Dependable Applications (JoWUA), pp.76-97, 2013.

S. Malik and J. Lee, Privacy Enhancing Factors in People-Nearby Applications, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.113-121, 2015.

A. D. Kent, L. M. Liebrock, and J. Wernicke, Differentiating User Authentication Graphs, 2013 IEEE Security and Privacy Workshops, pp.24-38, 2014.
DOI : 10.1109/SPW.2013.38

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.678.6267

L. E. Moser, Y. Amir, P. M. Melliar-smith, and D. A. Agarwal, Extended virtual synchrony, 14th International Conference on Distributed Computing Systems, pp.55-65, 1994.
DOI : 10.1109/ICDCS.1994.302392

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.8617

J. H. Wen, M. C. Wu, and T. S. Chen, A Novel Elliptic Curve Method for Secure Multicast System, Far East Journal of Mathematical Sciences, vol.28, issue.2, pp.449-467, 2008.

K. P. Wu, S. J. Ruan, C. K. Tseng, and F. Lai, Hierarchical Access Control Using the Secure Filter, IEICE Transaction On Information & System, issue.6, pp.700-708, 2001.