共 12 条
[1]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[2]
Blundo C., 1993, LNCS, V740, P471
[3]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[4]
Chan SP, 2005, GLOB TELECOMM CONF, P1007
[5]
Dai TT, 2006, LECT NOTES COMPUT SC, V4208, P260
[6]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[7]
Du WL, 2004, IEEE INFOCOM SER, P586
[8]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[9]
LIU D, 2005, ACM T INFORM SYSTEM, V8, P41, DOI DOI 10.1145/1053283
[10]
MATSUMOTO T, 1988, LECT NOTES COMPUT SC, V293, P185