1. Lecture Notes in Computer Science;J. Douceur,2002
2. Perrig, A., Hu, Y.-C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks, Technical Report TR01-384. Dep. Of Computer Science, Rice University (2001)
3. EC Directorate F, IST Framework, Future and Emerging Technologies, Situated and Autonomic Communications (COMS) - Communication Paradigms for 2020, Available at: http://www.cordis.lu/ist/fet/comms.htm
4. Chess, D.M., Palmer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal 42(1) (2003)
5. Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proc. New Security Paradigms Workshop. ACM, New York (1997)