1. Zhou, L. and Haas, Z.J., Securing ad hoc networks, IEEE Network Mag., 1999, vol. 13, no. 6, pp. 24–30.
2. Luo, H., Kong, J., Zerfos, P., Lu, S., and Zhang, L., URSA: Ubiquitous and robust access control for mobile ad hoc networks, IEEE ACM Trans. Networking, 2004, vol. 12, no. 6, pp. 1049–1063.
3. Sarkar, S., Kisku, B., Misra, S., and Obaidat, M.S., Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme, IEEE Int. Conf. Wireless Mob. Comput. Networking Commun., 2009, pp. 258–262.
4. Ertaul, L. and Chavan, N., Security of ad hoc networks and threshold cryptography, Int. Conf. Wireless Networks Commun. Mob. Comput., 2005, vol. 1, pp. 69–74.
5. Lee, J.S. and Chang, C.C., Secure communications for cluster-based ad hoc networks using node identities, J. Network Comput. Appl., 2007, vol. 30, no. 4, pp. 1377–1396.