The official PGP user's guide, 1995. ,
Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.2, issue.1, pp.52-64, 2002. ,
DOI : 10.1109/TMC.2003.1195151
A mobility based metric for clustering in mobile ad hoc networks, Proceedings 21st International Conference on Distributed Computing Systems Workshops, pp.43-51, 2001. ,
DOI : 10.1109/CDCS.2001.918738
A Hiearchical Distributed Architecture to Secure Ad-Hoc Networks, MSN Int. Conf., 13-15 Dec, 2006. ,
SMulticluster, Mobile Multimedia Radio Networks, Wireless Networks, pp.255-256, 1995. ,
Quality of Authentication in Ad Hoc Networks, 2004. ,
Mobility-based d-hop Clustering Algorithm for Mobile Ad Hoc Networks, 2004. ,
Mobility helps peer-to-peer security, IEEE Transactions on Mobile Computing, vol.5, issue.1, pp.48-60, 2006. ,
DOI : 10.1109/TMC.2006.12
Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel, IEEE Proceedings of SICON'97, pp.197-211, 1997. ,
A Distributed Trust Model. New Paradigms Workshop, ACM, 1997. ,
Securing ad hoc networks, IEEE Network, vol.13, issue.6, pp.24-30, 1999. ,
DOI : 10.1109/65.806983
A cluster-based security architecture for ad hoc networks, IEEE INFOCOM 2004, 2004. ,
DOI : 10.1109/INFCOM.2004.1354661
Belding-Royer : An Authenticated Routing Protocol for Secure Ad Hoc Networks, Selected Areas in Communication (JSAC, pp.23-598, 2005. ,
The network simulator ns-2. Part of the VINT project Available from http, 1998. ,