[1]
|
Kefa Rabah, “Theory and Implementation of Elliptic Curve Cryptography,” Journal of Applied Sciences, Vol. 5, No. 4, 2005, pp. 604-633.
|
[2]
|
W. Stallings, “Cryptography and Network Security Principles and Practices,” 3rd Edition, Pearson Education.
|
[3]
|
Y. Wang, B. Ramamurthy and X. K. Zou, “The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks,” IEEE International Conference on Communication, Vol. 5, 2006, pp. 2243-2248.
|
[4]
|
Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik, “On the Performance of Group Key-Agreement Protocols,” Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems, Viena, Austria, 2002.
|
[5]
|
M. Steiner, G. Tsudik and M. Waidner, “Key Agreement in Dynamic Peer Groups,” IEEE Transaction on Parallel and Distributed Systems, Vol. 11, No. 8, 2000, pp. 769- 780.
|