[1]
C. A. Kumar, R. S. Lakshmi, and M. Preethi, “Implementing Secure Group Communications using Key Graphs”, Def. Sc. J., vol. 57, no. 2, pp. 279–286, Mar. 2007.