1. D.P. Agrawal, L. Venkataraman, Authentication scheme for ad hoc and sensor wireless networks, November 2000, Patent disclosure filed by the University of Cincinnati, file number 100-060.
2. W.A. Arbaugh, N. Shankar, J. Wang, Your 802.11 network has no clothes, http://www.cs.umd.edu/waa/wireless.pdf, December 2001.
3. J. Binkley, Authenticated ad hoc routing at the link layer for mobile systems, http://citeseer.nj.nec.com/cachedpage/121413/1.
4. N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Seventh Annual International Conference on Mobile Computing and Networking, 2000, pp. 180–188.
5. A. Boukerche, M.S.M. Notare, Neural fraud detection in mobile phone operations, in: Fourth IEEE BioSP3, Bio-Inspired Solutions to Parallel Processing, May 2000, pp. 636–644.