W. G. Tzeng, A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol, IEEE Transactions on Computers, vol.51, issue.4, pp.373-379, 2002.
DOI : 10.1007/978-3-540-46588-1_1

O. Ermi?, S. Bahtityar, E. Anarim, and M. U. Ça?layan, An improved conference-key agreement protocol for dynamic groups with efficient fault correction, Security and Communication Networks, vol.13, issue.7, pp.1347-1359, 2015.
DOI : 10.1016/j.jss.2009.02.006

Y. M. Tseng, A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy, Journal of Systems and Software, vol.80, issue.7, pp.1091-1101, 2007.
DOI : 10.1016/j.jss.2006.10.053

K. H. Rhee, Y. H. Park, and G. Tsudik, An architecture for key management in hierarchical mobile ad-hoc networks, Journal of Communications and Networks, vol.6, issue.2, pp.1-7, 2004.
DOI : 10.1109/JCN.2004.6596636

M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, Proc. Advances in Cryptology ? Eurocrypt'00, pp.139-155, 2000.
DOI : 10.1007/3-540-45539-6_11

Y. M. Tseng, A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants, The Computer Journal, vol.48, issue.4, pp.480-487, 2005.
DOI : 10.1093/comjnl/bxh111

J. Katz and J. S. Shin, Modelling insider attacks on group key exchange protocols, ACM Conf. on Computer and Communications Security, pp.180-189, 2005.
DOI : 10.1145/1102120.1102146

Q. Tang and C. J. Mitchell, Security Properties of Two Authenticated Conference Key Agreement Protocols, Information and Communications Security: 7th Int. Conf., ICICS 2005, pp.304-314, 2005.
DOI : 10.1007/11602897_26

URL : http://eprint.iacr.org/2005/185.pdf

Y. Chung, The design of authentication key protocol in certificate-free public key cryptosystem, Security Communication Networks, pp.2125-2133, 2013.
DOI : 10.1109/TIT.2008.920224

Z. Cheng, Y. Liu, C. Chang, and C. Guo, A fault-tolerant group key agreement protocol exploiting dynamic setting, International Journal of Communication Systems, vol.23, issue.2, pp.259-275, 2013.
DOI : 10.1002/dac.1095

J. Zhao, D. Gu, and Y. Li, An efficient fault-tolerant group key agreement protocol, Computer Communications, vol.33, issue.7, pp.890-895, 2010.
DOI : 10.1016/j.comcom.2010.01.001

K. H. Huang, Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen, A conference key agreement protocol with fault-tolerant capability, Computer Standards & Interfaces, vol.31, issue.2, pp.401-405, 2009.
DOI : 10.1016/j.csi.2008.05.015

Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-ferrer, Asymmetric Group Key Agreement, Advances in Cryptography -EUROCRYPT 2009, pp.153-170
DOI : 10.1007/3-540-44448-3_47

Z. Wang, Improvement on the fault-tolerant group key agreement protocol of Zhao et al. Security Communication Networks, pp.166-170, 2016.

J. Katz and M. Yung, Scalable Protocols for Authenticated Group Key Exchange, Journal of Cryptology, vol.20, issue.1, pp.85-113, 2007.
DOI : 10.1007/s00145-006-0361-5

Y. M. Tseng, An improved conference-key agreement protocol with forward secrecy, Informatica Lithuania Academy of Sciences, vol.16, pp.275-284, 2005.

B. Ryabko and A. Fionov, Basics of Contemporary Cryptography for IT Practioners, 2005.

J. Katz and Y. Lindell, Introduction to Modern Cryptography: Principles and Protocols, CRC, 2007.

S. Chatterjee, C. Kamath, and V. Kumar, Galindo-Garcia Identity-Based Signature Revisited, Information Security and Cryptology ? ICISC 2012, pp.456-471, 2013.
DOI : 10.1007/978-3-642-37682-5_32

URL : http://eprint.iacr.org/2012/646.pdf

S. Chatterjee and C. Kamath, A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound, Algorithmica, vol.4, issue.2, pp.1-42, 2015.
DOI : 10.1007/978-3-642-29011-4_33

C. C. Lee, C. T. Li, C. Y. Wu, and S. Y. Huang, An Enhanced Fault-Tolerant Conference Key Agreement Protocol, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol.8, issue.12, pp.2231-2235, 2014.

E. Fray, I. Hyla, T. Kurkowski, M. Ma?ków, W. Peja? et al., Practical authentication protocols for protecting and sharing sensitive information on mobile devices

E. Fray, I. Hyla, T. Chocianowicz, and W. , Protection Profile for Secure Sensitive Information System on Mobile Devices, CISIM 2014, pp.636-650, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01405659

T. Hyla and J. Peja?, Certificate-Based Encryption Scheme with General Access Structure, CISIM 2012, pp.41-55, 2012.
DOI : 10.1007/978-3-642-33260-9_3

URL : https://hal.archives-ouvertes.fr/hal-01551717

T. Hyla and J. Peja?, A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture, CISIM 2013, pp.178-193, 2013.
DOI : 10.1007/978-3-642-40925-7_19

URL : https://hal.archives-ouvertes.fr/hal-01496066

T. Hyla, W. Ma?ków, and J. Peja?, Implicit and Explicit Certificates-Based Encryption Scheme, CISIM 2014, pp.651-666, 2014.
DOI : 10.1007/978-3-642-33260-9_3

URL : https://hal.archives-ouvertes.fr/hal-01405660