1. Xiong, W.-A., Kun, S., Gong, Y.-H.: Ad Hoc Security authentication mechanism overview of Ad hoc network nodes. Comput. Eng. Appl. 44(13) (2008)
2. Desmedt, Y.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449–457 (1994)
3. Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)
4. Yi, S., Kravets, R.: MOCA: mobile certificate authority for wireless ad hoc networks. In: Proceedings of the 2nd Annual PKI Research Workshop (PKI 2003), April 2003.
http://mobius.cs.uiuc.edu/~seungyi/
5. Yi, S., Kravets. R.: Key management for heterogeneous ad hoc wireless networks. Poster Presentation, ICNP 2002.
http://www-sal.cs.uiuc.edu/~rhk/pubs/tr-2290-1734.pdf