1. Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A new family of authentication protocols. In: ACMOSR: ACM Operating Systems Review, vol. 32, pp. 9–20 (1998)
2. Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. Financial Cryptography, 102–119 (2002)
3. Gehrmann, C.: Multiround unconditionally secure authentication. Designs, Codes, and Cryptography 15(1), 67–86 (1998)
4. Hammell, J., Weimerskirch, A., Girao, J., Westhoff, D.: Recognition in a low-power environment. In: ICDCSW 2005: Proceedings of the Second International Workshop on Wireless Ad Hoc Networking (WWAN) ICDCSW 2005), Washington, DC, USA, pp. 933–938. IEEE Computer Society, Los Alamitos (2005)
5. Lucks, S., Zenner, E., Weimerskirch, A., Westhoff, D.: Entity recognition for sensor network motes. GI Jahrestagung (2), 145–149 (2005)