1. , , , . A performance comparison of multi-hop wireless ad hoc network routing protocols. The fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, U.S.A., 1998; 85–97.
2. Securing ad hoc networks
3. Security in ad-hoc networks. 2005. http://users.tkk.fi/∼vkarpijo/
4. Principles of key management
5. A secure routing protocol with limited key distribution and double message hashing. Proceedings of the IEEE Pacific Rim Conference on Computer, Communications and Signal Processing (PacRim'03), vol. 2, Victoria, Canada, August 2003; 553–556.