1. Gerla, M. (2005). From battlefields to urban grids: New research challenges in ad hoc wireless networks. Pervasive and Mobile Computing, 1(1), 77–93
2. Barreto, P. S. L. M., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In CRYPTO ’02: Proceedings of the 22nd annual international cryptology conference on advances in cryptology (pp. 354–368). London, UK: Springer-Verlag.
3. Bellare, M., Desai, A., Pointcheval, D., & Rogaway, P. (1998). Relations among notions of security for public-key encryption schemes. In CRYPTO’98: Proceedings of the 18th annual international cryptology conference on advances in cryptology (pp. 26–45). London, UK: Springer-Verlag.
4. Zhou, L., & Haas, Z. (1999). Securing ad hoc networks. Network, IEEE, 13(6), 24–30.
5. Kong, J., Zerfos, P., Luo, H., Lu, S., & Zhang, L. (2001). Providing robust and ubiquitous security support for mobile ad-hoc networks. In International conference on network protocols (pp. 251–260). Los Angeles, CA: Department of Computer Science, California University.