Authentication Schemes and Their Construction for Dynamic Conferences

In the paper,we discuss two important authentication schemes used in network security:authentication schemes for dynamic conferences and authentication schemes for computer networks with topology which is not the complete graph.We show the size of the secret key space for each participant under the security level and provide their constructions