J. Katz, Bridging Game Theory and Cryptography: Recent Results and Future Directions, Lecture Notes in Computer Science, vol.4948, p.251, 2008.
DOI : 10.1007/978-3-540-78524-8_15

M. Raya, M. Manshaei, M. Félegyhazi, and J. Hubaux, Revocation games in ephemeral networks, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.199-210, 2008.
DOI : 10.1145/1455770.1455797

R. Li, J. Li, H. Kameda, and P. Liu, Localized public-key management for mobile ad hoc networks, IEEE Global Telecommunications Conference, GLOBECOM'04, 2004.

H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, Self-securing ad hoc wireless networks, Seventh IEEE Symposium on Computers and Communications (ISCC02), 2002.

S. Chinni, J. Thomas, G. Ghinea, and Z. Shen, Trust model for certificate revocation in ad hoc networks, Ad Hoc Networks, pp.441-457, 2008.
DOI : 10.1016/j.adhoc.2007.03.005

G. Arboit, C. Crépeau, C. Davis, and M. Maheswaran, A localized certificate revocation scheme for mobile ad hoc networks, Ad Hoc Networks, pp.17-31, 2008.
DOI : 10.1016/j.adhoc.2006.07.003

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Advanced communications and multimedia security: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security 107. [11] Wireless Public Key Infrastructure - Main Specification. [Online]. Available: Rev. 2.2, 2002.
DOI : 10.1007/978-0-387-35612-9_9

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '03, pp.315-325, 2005.
DOI : 10.1145/941326.941334

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004.
DOI : 10.1109/MWC.2004.1269716

H. Yang, J. Shu, X. Meng, and S. Lu, SCAN: self-organized network-layer security in mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.261-273, 2006.
DOI : 10.1109/JSAC.2005.861384

S. Radosavac, J. Baras, and I. Koutsopoulos, A framework for MAC protocol misbehavior detection in wireless networks, Proceedings of the 4th ACM workshop on Wireless security , WiSe '05, pp.33-42, 2005.
DOI : 10.1145/1080793.1080801

]. T. Moore, J. Clulow, S. Nagaraja, and R. Anderson, New Strategies for Revocation in Ad-Hoc Networks, Lecture Notes in Computer Science, vol.4572, p.232, 2007.
DOI : 10.1007/978-3-540-73275-4_17

C. Daskalakis, P. Goldberg, and C. Papadimitriou, The complexity of computing a nash equilibrium, Commun. ACM, 2009.

T. Roughgarden, Selfish Routing and the Price of Anarchy, 2005.
DOI : 10.1017/CBO9781316779309.012