1. , , . A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, ACM/SIGMOBILE 4th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), June 2003, MD, USA, 2003.
2. . Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks), ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), June 2002, Lausanne, Switzerland, 2002.
3. , , , . Adaptive security for threshold cryptosystems. Advances in Cryptology—Crypto'99, LNCS 1666, Springer-Verlag, 1999, pp. 98-115.
4. , , , , . Multicast security: a taxonomie and some efficient constructions. In Proceedings of IEEE INFOCOM '99, New York, USA, March 1999.
5. Self-organized public-key management for mobile ad hoc networks