1. Argyroudis, P.G., Verma, R., Tewari, H., O’Mahony, D.: Performance analysis of cryptographic protocols on handheld devices. Technical report TCD-CS-2003-46, University of Dublin, Trinity College (2003)
2. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad hoc wireless networks. In: Proc. 9th Network and Distributed System Security Symposium (2002)
3. Blaze, M., Feigenbaum, J., Keromytis, A.D.: The KeyNote trust management system version 2. Internet Engineering Task Force RFC 2704 (1999)
4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (1996)
5. Lecture Notes in Computer Science;D. Boneh,2001