N. B. Azzouna and F. Guillemin, “Experimental Analysis of the Impact of Peer-to-Peer Applications on Traffic in Commercial IP Networks,” European Transactionson Telecommunications, Special Issue on P2PNetworking and P2P Services, Vol. 15, No. 6, November-December 2004, pp. 511-522.
 T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy and M. Faloutsos, “Is P2P Dying or Just Hiding?” Proceeding s of IEEE Global Telecommunications Conference, Dallas, Vol. 3, 29 November-3 December 2004, pp. 1532-1538.
 J. Yang, Y. P. Zhong and S.Y. Zhang, “An Effcient Interest-Group Based Search Mechanism in Unstructured Peer-to-Peer Networks,” Proceddings of the International Conference on Computer Networks and Mobile Computing, Shanghai, 20-23 October 2003, pp. 247-252.
 T. H.-T. Hu, B. Thai and A. Seneviratne, “Supporting Mobile Devices in Gnutella File Sharing Network with Mobile Agents,” Proceedings of the 8th IEEE International Symposium on Computers and Communications, Kemer-Antalya, 28 June-1 July 2004, pp. 25-30.
 S. Liu, W. Jiang and J. Li, “Architecture and Performance Evaluation for P2P Application in 3G Mobile Cellular Systems”, Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 21-25 September 2007, pp. 914-917. doi:10.1109/WICOM.2007.235
 D. Wagner, “GSM Cloning,” June 2010 http://www.isaac.cs.berkeley.edu/isaac/gsm.html
 S. Zhao, A. Aggarwal and S. Liu, “Building Secure User-to-User Messaging in Mobile Telecommunication Networks,” Proceedings of Wireless Telecomunications Symposium, Pomona, 24-26 April 2008, pp. 151-157. doi:10.1109/WTS.2008.4547559
 K. Hoeper and G. Gong “Preventing or Utilising Key Escrow in Identity-Based Schemes Employed in Mobile Ad Hoc Networks,” International Journal of Security and Networks, Vol. 2, No. ?, 2007, pp. 239-250.