1. Abdul-Rahman, A. (1997). The PGP trust model. EDI-Forum: The Journal of Electronic Commerce, 10, 27–31.
2. Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In 20th international conference on very large data bases.
3. Azizyan, M., Constandache, I., & Choudhury, R. R.: SurroundSense: Mobile phone localization via ambience fingerprinting. In Proceedings of the international conference on mobile systems, applications, and services (MobiSys).
4. Balfanz, D., Smetters, D., Stewart, P., & Wong, H. (2002). Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the 9th annual network and distributed system security symposium (NDSS).
5. Bettstetter, C., & Hartmann, C. (2005). Connectivity of wireless multihop networks in a shadow fading environment. The Journal of Mobile Communication, Computation and Information.