1. Securing ad hoc networks;Zhou;IEEE Network,1999
2. A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: how to cope with perpetual leakage, Advances in cryptography – Crypto’ 95, Lecture Notes in Computer Science, 963, 1998.
3. How to share a secret;Shamir;Communications of the ACM,1979
4. M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, L,Wolf, A cluster-based security architecture for ad hoc networks, in: Proceedings of the 23rd IEEE INFOCOM’04, Hong Kong, China, March 2004, 2004.
5. Providing robust and ubiquitous security support for mobile ad-hoc networks;Kong;Proceedings of the International Conference on Network Protocols (ICNP),2001