Key management and authentication schemes for secure communication in a group, multiple groups, multi-layer groups and managing bursty behavior in a group
Human identification through signature and IRIS recognition