1. Zhou L, Haas Z J. Securing Ad Hoc networks. IEEE Network, 1999, 13(6): 24–30
2. Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad Hoc networks. In: Proceedings of 9th International Conference on Network Protocols. 2001, 251–260
3. Khalili A, Katz J, Arbaugh W. Toward secure key distribution in truly Ad-Hoc networks. In: Proceedings of 2003 SAINT Workshops. 2003, 342–346
4. Hegland A M, Winjum E, Mjolsnes S F, Rong C, Kure Ø, Spilling P. A survey of key management in Ad Hoc networks. IEEE Communications Surveys & Tutorials, 2006, 8(3): 48–66
5. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO. 1984, 84: 47–53