1. E.M. Royer and C.K. Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, Vol. 6, No. 2, pp. 46–55, 1999.
2. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures”, Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002.
3. A.A. Pirzada and C. McDonald, “A Review of Secure Routing Protocols for Ad-hoc Mobile Wireless Networks”, Proceedings of the 7th International Symposium on DSP for Communication Systems (DSPCS) and 2nd Workshop on the Internet, Telecommunications and Signal Processing (WITSP), pp. 118–123, 2003.
4. A.A. Pirzada, A. Datta, and C. McDonald, “Propagating Trust in Ad-hoc Networks for Reliable Routing”, Proceedings of the International Workshop on Wireless Ad-hoc Networks (IWWAN), 2004a.
5. R.C. Mayer, J.H. Davis, and F.D. Schoorman, “An Integrative Model of Organizational Trust”, Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, Vol. 20, No. 3, pp. 709–734, 1995.