This book aims to fill a growing need in the research community for a
reference that describes the state-of-the-art in securing group
communications. It focuses on tailoring the security solution to the
underlying network architecture (such as the wireless cellular network
or the ad hoc/sensor network), or to the application using the security
methods (such as multimedia multicasts).