The following publications are possibly variants of this publication:
- A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc NetworksYi Zhang, Wenxing Chen. npc 2008: 328-330 [doi]
- A polynomial-time approximation scheme for the minimum-connected dominating set in ad hoc wireless networksXiuzhen Cheng, Xiao Huang, Deying Li, Weili Wu, Ding-Zhu Du. networks, 42(4):202-208, 2003. [doi]
- A distributed secret share update scheme with public verifiability for ad hoc networkZhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang. scn, 8(8):1485-1493, 2015. [doi]