Recommendations in using group key management algorithms | IEEE Conference Publication | IEEE Xplore