References
- A, Abdul-Rahman, and S. Hailes, 'A Disthbuted Trust Model,' ACM New Security Paradigm Workshop, pp. 48-60, 1997
- N. Asokan, and P. Ginzboorg, 'Key Agreement in Ad Hoc Networks,' Computer Communications, vol. 23, pp. 1627-1637, 2000 https://doi.org/10.1016/S0140-3664(00)00249-8
- U. Carlsen, 'Optimal Privacy and Authentication on a Portable Communication Systern,' Operating Systems Review, vol. 28, no. 3, pp. 16-23, 1994 https://doi.org/10.1145/182110.182112
- D. Chaum, 'The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability,' Journal of Cryptology, vol. 1, no. 1, pp. 65-75, 1988
- J.-P. Hubaux, L. Buttyn, and S. Apkun. 'The Quest for Security in Mobile Ad HocNetworks,' ACM Symposium on MobileAd Hoc Networking and Computing, 2001
- J. M. Kahn, R. H. Katz, and K. S Pister, 'Next Century Challenges:Mobile Net-working for 'SmartDust',' International Conference on Mobile Computing and Networking,1999
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, 'Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,' Mobile Computing and Networking, pp. 255-265, 2000
- F. Stajano, 'The Resurrecting Duckling What Next?,' Lecture Notes in Computer Science, vol. 2133, pp. 204-214, 2000
- F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons, 2002
- F. Stajano, and R. Anderson, 'The Cocaine Auction Protocol: On the Power of Anonymous Broadcast,' Lecture Notes in Computer Science, vol. 1768, pp. 434-447, 1999
- F. Stajano, and R. Anderson, 'The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks,' Lecture Notes in Computer Science, vol. 1796, pp. 172-182, 1999
- A. Weimerskirch, and G. Thonet, 'A Distributed Light-Weight Authentication Model for Ad-Hoc Networks,' Lecture Notes in Computer Science, vol. 2288, pp. 341-354, 2001
- K. Wrona, 'Distributed Security: Ad-Hoc Networks and Beyond. Workshop on Requirements for Mobile Privacy and Security, 2002
- L. Zhou, and Z. H. Haas, 'Securing Ad Hoc Networks,' IEEE Network Magazine, vol. 13, no. 6, 1999