R. Philip, M. Zimmermann, and U. , The official PGP user's guide, 1995.

S. Capkun, L. Buttyan, and J. Hubaux, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.2, issue.1, pp.52-64, 2002.
DOI : 10.1109/TMC.2003.1195151

P. Basu, N. Khan, and T. Little, A mobility based metric for clustering in mobile ad hoc networks, Proceedings 21st International Conference on Distributed Computing Systems Workshops, pp.43-51, 2001.
DOI : 10.1109/CDCS.2001.918738

A. Rachedi and A. Benslimane, A Hiearchical Distributed Architecture to Secure Ad-Hoc Networks, 2006.

M. Gerla and J. T. Tsai, SMulticluster, Mobile Multimedia Radio Networks, Wireless Networks, pp.255-256, 1995.

S. Yi and R. Kravets, Quality of Authentication in Ad Hoc Networks, 2004.

I. , I. Er, and W. K. Seah, Mobility-based d-hop Clustering Algorithm for Mobile Ad Hoc Networks, 2004.

S. Capkun, J. P. Hubaux, and L. Buttyan, Mobility helps peer-to-peer security, IEEE Transactions on Mobile Computing, vol.5, issue.1, pp.48-60, 2006.
DOI : 10.1109/TMC.2006.12

C. Chiang, H. Wu, W. Liu, and M. Gerla, Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel, IEEE Proceedings of SICON'97, pp.197-211, 1997.

L. Zhou and Z. J. Haas, Securing ad hoc networks, IEEE Network, vol.13, issue.6, pp.24-30, 1999.
DOI : 10.1109/65.806983

M. Bechler, H. Hof, D. Kraft, F. Pahlke, and L. Wolf, A cluster-based security architecture for ad hoc networks, IEEE INFOCOM 2004, 2004.
DOI : 10.1109/INFCOM.2004.1354661

K. Sanzgiri, B. Dahill, D. Laflamme, B. N. Levine, C. Shields et al., Belding-Royer: An Authenticated Routing Protocol for Secure Ad Hoc Networks, Selected Areas in Communication (JSAC, pp.23-598, 2005.

U. Berkeley and U. Isi, The network simulator ns-2. Part of the VINT project Available from http, 1998.