1. Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 122–136, April 1980
2. Ren, K., Shucheng, Yu., Lou, W., Zhang, Y.: Multi-user broadcast authentication in wireless sensor networks. IEEE Trans. Veh. Technol. 58(8), 4554–4564 (2009)
3. Ren, K., Lou, W., Zeng, K., Moran, P.J.: On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 6(11), 4136–4144 (2007)
4. Liu, F., Cai, Y., Wang, C., Yan, C.: Research of traverse and application of Merkle authentication tree. Comput. Eng. Appl. (2011)
5. Narasimha, M., Tsudik, G.: DSAC. Integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, 31 October–5 November 2005, pp. 235–236 (2005)