共 20 条
[1]
[Anonymous], 2007, CRC HDB COMBINATORIA
[2]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[4]
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[6]
Carmen D.W, 2000, 00010 NAI LABS
[7]
Chakrabarti D, 2005, LECT NOTES COMPUT SC, V3650, P89
[8]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[9]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]