Topological Properties of Secure Wireless Sensor Networks Under the $q$ -Composite Key Predistribution Scheme With Unreliable Links
暂无分享,去创建一个
[1] Shreyas Sundaram,et al. Robustness and Algebraic Connectivity of Random Interdependent Networks , 2015, ArXiv.
[2] Andrei Z. Broder,et al. Workshop on Algorithms and Models for the Web Graph , 2007, WAW.
[3] Katarzyna Rybarczyk,et al. Diameter, connectivity, and phase transition of the uniform random intersection graph , 2011, Discret. Math..
[4] Jyoti Pandey,et al. Distribution of k -connectivity in the secure wireless sensor network , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[5] Jun Zhao. Designing secure networks with q-composite key predistribution under different link constraints , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Jun Zhao,et al. Parameter control in predistribution schemes of cryptographic keys , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[7] Maurizio Rebaudengo,et al. A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite , 2017, IEEE Transactions on Information Forensics and Security.
[8] Krzysztof Krzywdzinski,et al. Geometric Graphs with Randomly Deleted Edges - Connectivity and Routing Protocols , 2011, MFCS.
[9] Jun Zhao,et al. $k$ -Connectivity in Random Key Graphs With Unreliable Links , 2015, IEEE Transactions on Information Theory.
[10] P. Erdos,et al. On the strength of connectedness of a random graph , 1964 .
[11] Blair D. Sullivan,et al. Hyperbolicity, degeneracy, and expansion of random intersection graphs , 2014, WAW.
[12] Sotiris E. Nikoletseas,et al. On Some Combinatorial Properties of Random Intersection Graphs , 2015, Algorithms, Probability, Networks, and Games.
[13] Osman Yagan. Performance of the Eschenauer–Gligor Key Distribution Scheme Under an ON/OFF Channel , 2012, IEEE Transactions on Information Theory.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Jun Zhao,et al. On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[16] Mindaugas Bloznelis,et al. Component evolution in a secure wireless sensor network , 2009, Networks.
[17] Jiming Chen,et al. Cyber Security for Industrial Control Systems : From the Viewpoint of Close-Loop , 2016 .
[18] Mindaugas Bloznelis,et al. Degree and clustering coefficient in sparse random intersection graphs , 2013, 1303.3388.
[19] Virgil D. Gligor,et al. On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels , 2014, 2014 IEEE International Symposium on Information Theory.
[20] Pil Joong Lee,et al. Exact Formulae for Resilience in Random Key Predistribution Schemes , 2012, IEEE Transactions on Wireless Communications.
[21] D. Manjunath,et al. On connectivity thresholds in superposition of random key graphs on random geometric graphs , 2013, 2013 IEEE International Symposium on Information Theory.
[22] Jun Zhao,et al. On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs , 2015, ANALCO.
[23] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[24] Jun Zhao,et al. Topology Control in Secure Wireless Sensors Networks , 2016 .
[25] Roberto Di Pietro,et al. Redoubtable Sensor Networks , 2008, TSEC.
[26] Armand M. Makowski,et al. Zero–One Laws for Connectivity in Random Key Graphs , 2009, IEEE Transactions on Information Theory.
[27] Hideaki Ishii,et al. Consensus of second-order multi-agent systems in the presence of locally bounded faults , 2015, Syst. Control. Lett..
[28] A. Dasgupta. Asymptotic Theory of Statistics and Probability , 2008 .
[29] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[30] Jun Zhao,et al. Threshold functions in random s-intersection graphs , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[31] Virgil D. Gligor,et al. k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model , 2012, ArXiv.
[32] Jun Zhao. Modeling interest-based social networks: Superimposing Erdős-Rényi graphs over random intersection graphs , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[33] Jun Zhao,et al. Connectivity in secure wireless sensor networks under transmission constraints , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[34] Virgil D. Gligor,et al. Secure k-connectivity in wireless sensor networks under an on/off channel model , 2013, 2013 IEEE International Symposium on Information Theory.
[35] P. Erd Os,et al. On the strength of connectedness of random graphs , 1961 .
[36] Jie Ding,et al. Key Pre-Distributions From Graph-Based Block Designs , 2016, IEEE Sensors Journal.
[37] Jun Zhao. On the resilience to node capture attacks of secure wireless sensor networks , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).