2ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30.
3DA SILVA E, DOS SANTOS A, ALBINI L C E et al. Identity-based key management in mobile ad hoc networks: techniques and applications[J]. IEEE Wireless Communications, 2008, 15(5): 46-52.
4LUO H, ZEFROS P, KONG J, et al. Self-securing ad hoc wireless networks[A]. Proceeding of the Seventh IEEE Symposium on Computers and Communications (ISCC'02)[C]. Taormina, Italy, 2002. 548-555.
5KHALILI A, KATZ J. Toward secure key distribution in truly Ad-Hoc networks[A]. Proceedings of the Symposium on Applications and the Internet Workshops (SAINT03)[C]. Orlando, FL, USA, 2003. 342-346.
6BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
7DENG H, MUKHERJEE A, AGRAWAL D E Threshold and identity-based key management and authentication for wireless ad hoe networks[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)[C]. Las Vegas, USA, 2004. 107-110.
8SUI A, CHOW S, HUI L, et al. Separable and anonymous identity-based key issuing without secure channel[A]. Proceedings of the 1st International Workshop on Security in Networks and Distributed Systems (SNDS'05)[C]. Fukuoka, Japan, 2005. 275-279.
9KWON S, LEE S H. Identity-based key issuing without secure channel in a broad area[A]. Proceedings of the 7th International Workshop on Information Security Applications (WISA'06)[C]. Jeju Island, Korea, 2006. 30-44.
10BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[J]. J Cryptology, 2004, 17(4): 297-319.