On rekey policies for secure group applications | IEEE Conference Publication | IEEE Xplore