Key trees and the security of interval multicast | IEEE Conference Publication | IEEE Xplore