2Shamir A.How to share a secret[J].Communications of the ACM,1979.22(11):612-613.
3Zhou Li-dong,Hass z J.Securing Ad Hoe networks[J].IEEE Networks.1999(11/12):24-29.
4Kong jie-jun,Zerfos P,Luo Hai-yun,et al.Providing robust and ubiquitons security support for mobile Ad Hoe networks[C] //9th International Conference on Network Protocols(ICNP).Washington:IEEE Computer Society,2001:251-261.
5Herzberg A,Jarechi s,Krawczyk H,et al.Proactive secret sharing or how to cope with perpetual leakage[C] //LNCS 963:Advances in Cryptography-Crypto 95.Berlin:Springer-Verlag,1998:963-976.