(Password) Authenticated Key Establishment: From 2-Party to Group, TCC 2007, pp.499-514, 2007. ,
DOI : 10.1007/978-3-540-70936-7_27
Password-Based Group Key Exchange in a Constant Number of Rounds, PKC 2006, pp.427-442, 2006. ,
DOI : 10.1007/11745853_28
Entity Authentication and Key Distribution, CRYPTO 1993, pp.232-249, 1994. ,
DOI : 10.1007/3-540-48329-2_21
Diffie???Hellman technique: extended to multiple two-party keys and one multi-party key, IET Information Security, vol.2, issue.1, pp.12-18, 2008. ,
DOI : 10.1049/iet-ifs:20060142
Protocols for Authentication and Key Establishment, 2003. ,
DOI : 10.1007/978-3-662-09527-0
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, PKC 2003, pp.31-46, 2003. ,
DOI : 10.1007/3-540-36288-6_3
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions, EUROCRYPT 2002, pp.321-336, 2002. ,
DOI : 10.1007/3-540-46035-7_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.361
Provably authenticated group Diffie-Hellman key exchange, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.255-264, 2001. ,
DOI : 10.1145/501983.502018
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6850
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust, ATC 2007, pp.395-409, 2007. ,
DOI : 10.1007/978-3-540-73547-2_41
Contributory group key exchange in the presence of malicious participants, IET Information Security, vol.2, issue.3, pp.85-93, 2008. ,
DOI : 10.1049/iet-ifs:20070113
Securing group key exchange against strong corruptions, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.249-260, 2008. ,
DOI : 10.1145/1368310.1368347
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.1282
On Security Models and Compilers for Group Key Exchange Protocols, IWSEC 2007, pp.292-307, 2007. ,
DOI : 10.1007/978-3-540-75651-4_20
A secure and efficient conference key distribution system, EUROCRYPT 1994, pp.275-286, 1994. ,
DOI : 10.1007/BFb0053443
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, EUROCRYPT 2001, pp.453-474, 2001. ,
DOI : 10.1007/3-540-44987-6_28
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols, ASIACRYPT 2005, pp.585-604, 2005. ,
DOI : 10.1007/11593447_32
Revisiting Pairing Based Group Key Exchange, FC 2008, pp.53-68, 2008. ,
DOI : 10.1007/978-3-540-85230-8_5
URL : http://repository.tue.nl/668437
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols, PKC 2009, pp.105-123, 2009. ,
A conference key distribution system, IEEE Transactions on Information Theory, vol.28, issue.5, pp.714-719, 1982. ,
DOI : 10.1109/TIT.1982.1056542
Parallel Key Exchange, J. of Univ. Comp. Sci, vol.14, issue.3, pp.377-396, 2008. ,
Modeling insider attacks on group key-exchange protocols, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.180-189, 2005. ,
DOI : 10.1145/1102120.1102146
Scalable Protocols for Authenticated Group Key Exchange, CRYPTO 2003, pp.110-125, 2003. ,
Constant-Round Authenticated Group Key Exchange for Dynamic Groups, ASIACRYPT 2004, pp.245-259, 2004. ,
DOI : 10.1007/978-3-540-30539-2_18
Group key agreement efficient in communication, IEEE Transactions on Computers, vol.53, issue.7, pp.905-921, 2004. ,
DOI : 10.1109/TC.2004.31
Tree-based group key agreement, ACM Transactions on Information and System Security, vol.7, issue.1, pp.60-96, 2004. ,
DOI : 10.1145/984334.984337
Stronger Security of Authenticated Key Exchange, ProvSec 2007, pp.1-16, 2007. ,
DOI : 10.1007/978-3-540-75670-5_1
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys, ACNS 2009, pp.1-19, 2009. ,
DOI : 10.1007/978-3-642-01957-9_1
Security-Focused Survey on Group Key Exchange Protocols, Cryptology ePrint Archive Report, vol.395, 2006. ,
Secure protocol transformation via ???expansion???, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.83-92, 1999. ,
DOI : 10.1145/319709.319721
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity, ACNS 2007, pp.158-176, 2007. ,
DOI : 10.1007/978-3-540-72738-5_11
A Secure Audio Teleconference System, CRYPTO 1988, pp.520-528, 1990. ,
Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, pp.31-37, 1996. ,
DOI : 10.1145/238168.238182
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups, FC 2008, pp.69-82, 2008. ,
DOI : 10.1007/978-3-540-85230-8_6