1. R.K. Ahuja, T.L. Magnati, and J.B. Olin, “Network Flows,” Prentice Hall, Upper Saddle River, NJ, 1993
2. B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-Demand Secure Routing Protocol Resilent to Byzantine Failures,” in Proceedings of the ACM Workshop on Wireless Security, Atlanta, GA, Sept. 2002
3. D. Balfanz, D.K. Smetters, P. Stuart, and H.C. Wang, “Talking to Strangers: Authentication in Ad Hoc Networks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2002
4. S.M. Bellovin and M. Merritt, “Encrypted Key Exchange: Password-based protocols secure against dictionary attacks,” in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1992
5. A. Bestavros and G. Kim, “TCP-Boston: A Fragmentation-Tolerant TCP Protocol for ATM networks,” in Proceedings of the IEEE Infocom 1997, Kobe, Japan, Apr. 1997