Using key trees for securing military multicast communication | IEEE Conference Publication | IEEE Xplore