1A Khalili, J Katz, W A Arbaugh. Towards secure key distribution in truly Ad hoc networks[ A]. IEEE Workshop on Security and Assurance in Ad hoe Networks[ C] .2003.
2Shamir A. How to shar a secret [ J ]. Communication of the ACM, 1979,22.
3Lidong Zhou, Zygmunt J Haas. Securing Ad hoc networks[J].IEEE Network Magazine, 1999,13(6) :24-30.
4H Luo, P Zerfos, J Kong, et al. Self-securing Ad hoc wireless networks[ A]. IEEE. ISCC[ C]. 2002.
5Srdjan Capkun, Levente Buttyan, Jean-Pierre Hubaux. Self-organized public-key management for mobile Ad hoc networks[J]. IE, EE Transaction on Mobile Computer,2002,6.
6Seung Yi, Robin Kravets. Composite key management for Ad hoc networks [ A]. First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services ( MobiQuitous' 04) [ C ]. 2004.52-61.