共 15 条
[1]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[2]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[3]
Chan SP, 2005, GLOB TELECOMM CONF, P1007
[4]
Dai TT, 2006, LECT NOTES COMPUT SC, V4208, P260
[5]
DAI TT, 2006, P 7 WISA 2006 JEJ IS, P121
[6]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[7]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[8]
Fu HR, 2005, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, P134
[9]
LIU D, 2003, P 10 ACM C COMP COMM, P52
[10]
MATSUMOTO T, 1988, LECT NOTES COMPUT SC, V293, P185