1. Anderson, R. and Kuhn, M. Tamper resistance - a cautionary note, inProc. 2nd USENIX Workshop Electron. Commerce, USENIX, Berkeley, CA, 1996, 1.
2. Stajano, F. and Anderson, R. The resurrecting duckling: security issues for ad-hoc wireless networks, inProc. 7th Int. Workshop Security Protocols, Christianson, B., Crispo, B., and Roe, M., Eds., Springer-Verlag, Heidelberg, 1999, 172.
3. Meguerdichian, S. et al., Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure, inProc. 2nd ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC), ACM Press, New York, 2001, 106.
4. Krishnamachari, B., Estrin, D., and Wicker, S. The impact of data aggregation in wireless sensor networks, inProc. Int. Workshop Distributed Event-Based Systems, IEEE Computer Society, Los Alamitos, CA, 575.
5. Cheswick, B., An evening with Berferd in which a cracker is Iured, endured, and studied, inProc. of Winter USENIX Conf., USENIX, Berkeley, CA, 1992, 163.