1. Surviving attacks on disruption-tolerant networks without authentication[C]// ACM International Symposium on Mobile Ad Hoc NETWORKING and Computing.;Burgess;ACM,2007
2. A Survey on Trust Management for Mobile Ad Hoc Networks[J].;Cho;IEEE Communications Surveys & Tutorials,2011
3. Privacy and confidentiality in context-based and epidemic forwarding[J].;Shikfa;Computer Communications,2010
4. Sacha Trifunovic F L. Trust in Opportunistic Networks[C]// 2010:1 - 6.
5. Multi-party authenticated key agreement protocols from multi-linear forms[M];Lee,2004