M. Abdalla, J. Bohli, M. I. Vasco, and R. Steinwandt, (Password) Authenticated Key Establishment: From 2-Party to Group, TCC 2007, pp.499-514, 2007.
DOI : 10.1007/978-3-540-70936-7_27

M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval, Password-Based Group Key Exchange in a Constant Number of Rounds, PKC 2006, pp.427-442, 2006.
DOI : 10.1007/11745853_28

M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, CRYPTO 1993, pp.232-249, 1994.
DOI : 10.1007/3-540-48329-2_21

G. P. Biswas, Diffie???Hellman technique: extended to multiple two-party keys and one multi-party key, IET Information Security, vol.2, issue.1, pp.12-18, 2008.
DOI : 10.1049/iet-ifs:20060142

C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment, 2003.
DOI : 10.1007/978-3-662-09527-0

A. Boldyreva, Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, PKC 2003, pp.31-46, 2003.
DOI : 10.1007/3-540-36288-6_3

E. Bresson, O. Chevassut, and D. Pointcheval, Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions, EUROCRYPT 2002, pp.321-336, 2002.
DOI : 10.1007/3-540-46035-7_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.361

E. Bresson, O. Chevassut, D. Pointcheval, and J. Quisquater, Provably authenticated group Diffie-Hellman key exchange, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.255-264, 2001.
DOI : 10.1145/501983.502018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6850

E. Bresson and M. Manulis, Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust, ATC 2007, pp.395-409, 2007.
DOI : 10.1007/978-3-540-73547-2_41

E. Bresson and M. Manulis, Contributory group key exchange in the presence of malicious participants, IET Information Security, vol.2, issue.3, pp.85-93, 2008.
DOI : 10.1049/iet-ifs:20070113

E. Bresson and M. Manulis, Securing group key exchange against strong corruptions, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.249-260, 2008.
DOI : 10.1145/1368310.1368347

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.1282

E. Bresson, M. Manulis, and J. Schwenk, On Security Models and Compilers for Group Key Exchange Protocols, IWSEC 2007, pp.292-307, 2007.
DOI : 10.1007/978-3-540-75651-4_20

M. Burmester and Y. Desmedt, A secure and efficient conference key distribution system, EUROCRYPT 1994, pp.275-286, 1994.
DOI : 10.1007/BFb0053443

R. Canetti and H. Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, EUROCRYPT 2001, pp.453-474, 2001.
DOI : 10.1007/3-540-44987-6_28

K. R. Choo, C. Boyd, and Y. Hitchcock, Examining Indistinguishability-Based Proof Models for Key Establishment Protocols, ASIACRYPT 2005, pp.585-604, 2005.
DOI : 10.1007/11593447_32

Y. Desmedt and T. Lange, Revisiting Pairing Based Group Key Exchange, FC 2008, pp.53-68, 2008.
DOI : 10.1007/978-3-540-85230-8_5

URL : http://repository.tue.nl/668437

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

M. C. Gorantla, C. Boyd, and J. M. , González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols, PKC 2009, pp.105-123, 2009.

I. Ingemarsson, D. T. Tang, and C. K. Wong, A conference key distribution system, IEEE Transactions on Information Theory, vol.28, issue.5, pp.714-719, 1982.
DOI : 10.1109/TIT.1982.1056542

I. R. Jeong and D. H. Lee, Parallel Key Exchange, J. of Univ. Comp. Sci, vol.14, issue.3, pp.377-396, 2008.

J. Katz and J. S. Shin, Modeling insider attacks on group key-exchange protocols, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.180-189, 2005.
DOI : 10.1145/1102120.1102146

J. Katz and M. Yung, Scalable Protocols for Authenticated Group Key Exchange, CRYPTO 2003, pp.110-125, 2003.

H. Kim, S. Lee, and D. H. Lee, Constant-Round Authenticated Group Key Exchange for Dynamic Groups, ASIACRYPT 2004, pp.245-259, 2004.
DOI : 10.1007/978-3-540-30539-2_18

Y. Kim, A. Perrig, and G. Tsudik, Group key agreement efficient in communication, IEEE Transactions on Computers, vol.53, issue.7, pp.905-921, 2004.
DOI : 10.1109/TC.2004.31

Y. Kim, A. Perrig, and G. Tsudik, Tree-based group key agreement, ACM Transactions on Information and System Security, vol.7, issue.1, pp.60-96, 2004.
DOI : 10.1145/984334.984337

B. Lamacchia, K. Lauter, and A. Mityagin, Stronger Security of Authenticated Key Exchange, ProvSec 2007, pp.1-16, 2007.
DOI : 10.1007/978-3-540-75670-5_1

M. Manulis, Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys, ACNS 2009, pp.1-19, 2009.
DOI : 10.1007/978-3-642-01957-9_1

M. Manulis, Security-Focused Survey on Group Key Exchange Protocols, Cryptology ePrint Archive Report, vol.395, 2006.

A. Mayer and M. Yung, Secure protocol transformation via ???expansion???, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.83-92, 1999.
DOI : 10.1145/319709.319721

J. Nam, J. Paik, U. Kim, and D. Won, Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity, ACNS 2007, pp.158-176, 2007.
DOI : 10.1007/978-3-540-72738-5_11

D. G. Steer, L. Strawczynski, W. Diffie, and M. J. Wiener, A Secure Audio Teleconference System, CRYPTO 1988, pp.520-528, 1990.

M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, pp.31-37, 1996.
DOI : 10.1145/238168.238182

S. Wu and Y. Zhu, Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups, FC 2008, pp.69-82, 2008.
DOI : 10.1007/978-3-540-85230-8_6