1. M. Brown, D. Cheung, D. Hankerson, J. Hernandez, M. Kirkup, A. Menezes, PGP in constrained wireless devices, in: 9th USENIX Security Symposium, August 2000, pp. 247–261.
2. D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers: authentication in ad-hoc wireless networks, in: Symposium on Network and Distributed Systems Security (NDSS’02), 2002.
3. D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, Finanical Cryptography (FC) 2002.
4. H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the IEEE Security and Privacy Symposim 2003, May 2003.
5. A. Cardenas, S. Radosavac, J. Baras, Detection and prevention of MAC layer misbehavior for ad hoc networks, in: Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks (SASN ’04).