@incollection{, 92706449F4DA4A541961D73B6C99BF24 , author={{SreejaRajesh} and {Mridula RD} and {}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}131121 27 } @book{b0, , title={{Group Key Management Protocol (GKMP) Architecture}} , author={{ HHarney } and { CMuckenhirn }} , year={July 1997, RFC 2093} } @incollection{b1, , title={{A Secure multicast Protocol with Copyright Protection}} , author={{ HChu } and { LQiao } and { KNahrstedt }} , journal={{ACM SIGCOMM Computer Communications Review}} , year={April 2002} } @incollection{b2, , title={{Key Management for Multicast: Issues and Architectures}} , author={{ DWallne } and { EHarder } and { RAgee }} , journal={{National Security Agency}} C2627 , year={1999} } @incollection{b3, , title={{A New Group Key Management Protocol using Code for Key Calculation: CKC}} , author={{ MHajyvahabzadeh } and { EEidkhani } and { SAMortazavi } and { ANemaneyPour }} , booktitle={{Proceedings of IEEE, IEEE Computer Society, the International Conference on Information Science and Applications (ICISA2010)}} IEEE, IEEE Computer Society, the International Conference on Information Science and Applications (ICISA2010)Seoul, Korea , year={Apr. 2010} } @incollection{b4, , title={{Secure broadcast using the secure lock}} , author={{ GHChiou } and { WTChen }} , journal={{IEEE Transactions on Software Engineering}} 15 8 , year={August 1989} } @incollection{b5, , title={{Key Establishment in Large Dynamic Groups Using One-Way Function Trees}} , author={{ DAMcgrew } and { ATSherman }} , journal={{IEEE TRANSACTIONS ON SOFTWARE ENGINEERING}} } @incollection{b6, , title={{The Varsakey Framework: Versatile Group Key management}} , author={{ MWaldvogel } and { GCaronni } and { DSun } and { NWeiler } and { BPlattner }} , journal={{IEEE Journal on Selected Areas in Communications (Special Issues on Middleware)}} 17 8 , year={August 1999} } @incollection{b7, , title={{A Framework for Scalable Secure Multicasting}} , author={{ SMittra }} doi: 10/1/1/39/4261 , booktitle={{Proc. of ACM SIGCOMM'97}} of ACM SIGCOMM'97 , year={Oct. 1997} } @incollection{b8, , title={{Kronos: A scalable Group Re-keying Approach for Secure Multicast}} , author={{ SSetia } and { SKoussih } and { SJaodia } and { EHarder }} , booktitle={{Proc. of IEEE Symposium on Security and Privacy}} of IEEE Symposium on Security and Privacy , year={2000} } @incollection{b9, , title={{Hydra: a decentralized group key management}} , author={{ &DRafaeli } and { Huchison }} , booktitle={{Proc. of the 11th IEEE International WETICE: Enterprise Security Workshop}} of the 11th IEEE International WETICE: Enterprise Security Workshop , year={Nov. 2002} } @incollection{b10, , title={{Marks: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences}} , author={{ BBriscoe }} , booktitle={{Proc. First International Workshop on Networked Group Communication (NGC)}} First International Workshop on Networked Group Communication (NGC)Pisa, Italy , year={November 1999} } @incollection{b11, , title={{EDKAS: An Efficient Distributed Key Agreement Scheme Using One Way Function Trees for Dynamic Collaborative Groups}} , author={{ JZhang } and { VLi } and { CChen } and { PTao } and { SYang }} 10.1109/CESA.2006.313506 , journal={{IMACS Multiconference on CESA}} , year={Oct. 2006} } @incollection{b12, , title={{DGKD: Distributed Group Key Distribution with Authentication Capability}} , author={{ LFan } and { DXiao-Ping } and { LQing-Kuan } and { ;PYan-Ming } and { XAdusumilli } and { Zou } and { Byrav }} 10.1109/ISCC.2000.860720 , booktitle={{Proc. of the 2005 IEEE Workshop on Information Assurance and Security}} of the 2005 IEEE Workshop on Information Assurance and SecurityUnited States Military Academy, West Point, NY , year={Jun. 2005} , note={IEEE 5th International Conference on 14} } @incollection{b13, , title={{An Efficient Distributed Group Key Management using Hierarchical Approach with Diffie-Hellman and Symmetric Algorithm}} , author={{ Hs. Anahita } and { AlirezaMortazavi } and { ToshihikoNemaney Pour } and { Kato }} doi: 10.1109/ IAS.2009.344 , booktitle={{Information Assurance and Security (IAS '09)}} Xian, China , year={FEB 2011. Aug. 2009} }