N. Asokan and P. Ginzboorg, Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000.
DOI : 10.1016/S0140-3664(00)00249-8

G. Ateniese, M. Steiner, and G. Tsudik, New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.628-639, 2000.
DOI : 10.1109/49.839937

D. Augot, R. Bhaskar, V. Issarny, and D. Sacchetti, An Efficient Group Key Agreement Protocol for Ad Hoc Networks, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, 2005.
DOI : 10.1109/WOWMOM.2005.26

URL : https://hal.archives-ouvertes.fr/inria-00414950

K. Becker and U. Wille, Communication complexity of group key distribution, Proceedings of the 5th ACM conference on Computer and communications security , CCS '98, pp.1-6, 1998.
DOI : 10.1145/288090.288094

M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, Advances in Cryptology -EUROCRYPT '00, pp.139-155, 2000.
DOI : 10.1007/3-540-45539-6_11

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

D. Boneh, The Decision Diffie-Hellman problem, ANTS-III: 3rd Algorithmic Number Theory Symposium, pp.48-63, 1998.
DOI : 10.1007/BFb0054851

M. Boulkenafed and V. Issarny, AdHocFS: sharing files in WLANs, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003., pp.156-163, 2003.
DOI : 10.1109/NCA.2003.1201150

URL : https://hal.archives-ouvertes.fr/inria-00414797

C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment, 2003.
DOI : 10.1007/978-3-662-09527-0

C. Boyd and J. M. Nieto, Round-Optimal Contributory Conference Key Agreement, Public Key Cryptography '03, pp.161-174, 2003.
DOI : 10.1007/3-540-36288-6_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.887

E. Bresson and D. Catalano, Constant Round Authenticated Group Key Agreement via Distributed Computation, Proceedings of Public Key Cryptography, pp.115-119, 2004.
DOI : 10.1007/978-3-540-24632-9_9

E. Bresson, O. Chevassut, and D. Pointcheval, Provably Authenticated Group Diffie-Hellman Key Exchange ??? The Dynamic Case, Advances in Cryptology - ASIACRYPT '01, pp.290-309, 2001.
DOI : 10.1007/3-540-45682-1_18

E. Bresson, O. Chevassut, and D. Pointcheval, Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions, Advances in Cryptology - EUROCRYPT '02, pp.321-326, 2002.
DOI : 10.1007/3-540-46035-7_21

E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater, Provably authenticated group Diffie-Hellman key exchange, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.255-264, 2001.
DOI : 10.1145/501983.502018

M. Burmester and Y. Desmedt, A secure and efficient conference key distribution system, Advances in Cryptology -EUROCRYPT '94, pp.275-286, 1994.
DOI : 10.1007/BFb0053443

R. Dutta and R. Barua, Dynamic Group Key Agreement in??Tree-Based??Setting, ACISP, pp.101-112, 2005.
DOI : 10.1007/11506157_9

S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988.
DOI : 10.1137/0217017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353

M. Just and S. Vaudenay, Authenticated multi-party key agreement, Advances in Cryptology -ASIACRYPT '96, pp.36-49, 1996.
DOI : 10.1007/BFb0034833

J. Katz and J. S. Shin, Modelling insider attacks on group key-exchange protocols
DOI : 10.1145/1102120.1102146

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.8580

J. Katz and M. Yung, Scalable protocols for authenticated group key exchange -full version, Advances in Cryptology -CRYPTO '03, pp.110-125, 2003.
DOI : 10.2139/ssrn.1157420

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.8829

Y. Kim, A. Perrig, and G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.235-244, 2000.
DOI : 10.1145/352600.352638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.9154

Y. Kim, A. Perrig, and G. Tsudik, Group key agreement efficient in communication, IEEE Transactions on Computers, vol.53, issue.7, pp.905-921, 2004.
DOI : 10.1109/TC.2004.31

N. Malpani, J. L. Welch, and N. Vaidya, Leader election algorithms for mobile ad hoc networks, Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications , DIALM '00, pp.96-103
DOI : 10.1145/345848.345871

A. J. Menezes, P. C. Van-oorschot, and S. Vanstone, HandBook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

J. Nam, J. Lee, S. Kim, and D. Won, DDH based group key agreement for mobile computing, 2004.

J. Pieprzyk and H. Wang, The key control in multi-party key agreement protocols, Proceedings of Workshop on Coding, Cryptography and Combinatorics, pp.277-288, 2004.

G. Roman, Q. Huang, and A. Hazemi, Consistent group membership in ad hoc networks, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001, pp.381-388, 2001.
DOI : 10.1109/ICSE.2001.919111

G. Singh, Leader Election in Complete Networks, SIAM Journal on Computing, vol.26, issue.3, pp.772-785, 1997.
DOI : 10.1137/S0097539794276865

M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, pp.31-37, 1996.
DOI : 10.1145/238168.238182

M. Steiner, G. Tsudik, and M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions on Parallel and Distributed Systems, vol.11, issue.8, pp.769-780, 2000.
DOI : 10.1109/71.877936