1. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: NDSS, San Diego, CA, USA (2002)
2. Lecture Notes in Computer Science;M. Bellare,2000
3. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: IEEE Security & Privacy, Oakland, CA, USA, pp. 72–84. IEEE, Los Alamitos (1992)
4. Lecture Notes in Computer Science;V. Boyko,2000
5. Lecture Notes in Computer Science;R. Canetti,2001