共 14 条
[1]
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[2]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[3]
CAMTEPE SA, EUROSICS 2004
[4]
CHAKRABARTI D, LECT NOTES COMPUTER, V3650
[5]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[6]
Dinitz, 1996, CRC HDB COMBINATORIA
[7]
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[8]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[9]
Kahn J. M., 1999, P 5 ANN ACM IEEE INT, P483
[10]
LEE J, 2005, IEEE WIR COMP NETW C