1. Heap: hop-by-hop efficient authentication protocol for mobile ad-hoc networks;Akbani,2007
2. A localized certificate revocation scheme for mobile ad hoc networks;Arboit;Ad Hoc Networks,2008
3. Identity-based encryption from the Weil pairing;Boneh,2001
4. Surviving attacks on disruption-tolerant networks without authentication;Burgess,2007