1. Andel, T. R., & Yasinac, A. (2006). On the credibility of manet simulations (Vol. 39, pp. 48–54). Los Alamitos, CA: IEEE Computer Society Press.
2. Arsenault, A. & Turner, S. (2000, November). Internet x.509 public key infrastructure. Internet Engineering Task Force (IETF).
3. Bhargava, B., Zoltowski, M., & Meunier, P. (2002). Trusted routing and intruder identification in mobile ad hoc networks. Research proposal for cerias 2002. Purdue University.
4. Buchegger, S. & Le Boudec, J.-Y. (2002, June 09–11). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’02) (pp. 226–236), Lausanne, Switzerland.
5. Chlamtac, I., Conti M., & Liu, J. (2003, July). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks 1(1), 13-64.