4Zhou L,Haas Z J.Securing Ad Hoc networks[J].IEEE Network,1999,13:24-30.
5Luo H,Zerfos P,Kong J,et a1.Self-securing Ad Hoc wireless networks[J/OL]∥7th IEEE Symp on Computers and Communications,2002,567-574.http:∥www-sal.cs.uiuc.edu/haiyun/publications/ISCC02.pdf.
6Hubaux J P,Buttyan L,Capkun S.Self-organized public-key management for mobile Ad hoc networks[J].IEEE Transactions on Mobile Computing,2003 2(1):52-64.
7Khalili A,Katz J,Arbaugh W A.Towards secure key distribution in truly Ad Hoc net wor-ks[J/OL]∥Proc of IEEE Workshop on Security and Assurance in Ad hoc Networks,2003.http:∥www.cs.umd.edu/jkatz/papers/id-threshold.ps.
8Li Guangsong,Han Wenbao.A new scheme for key management in Ad Hoc networks[C/OL]∥Proceeding of 4th International Conference on Networking,LNCAS 3421,2005.http:∥www.springerlink.com/content/v9uybwa7d0dlk30q/.
9Shamir A,How to share a secret[J].Communications of the ACM,1979,22(11):612-613.