A comprehensive guideline for choosing parameters in the Eschenauer-Gligor key predistribution
暂无分享,去创建一个
[1] Jun Zhao,et al. On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[2] Béla Bollobás,et al. Random Graphs: Notation , 2001 .
[3] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] Jun Zhao,et al. On Connectivity and Robustness in Random Intersection Graphs , 2017, IEEE Transactions on Automatic Control.
[6] Mindaugas Bloznelis,et al. Component evolution in a secure wireless sensor network , 2009 .
[7] Osman Yagan. Performance of the Eschenauer–Gligor Key Distribution Scheme Under an ON/OFF Channel , 2012, IEEE Transactions on Information Theory.
[8] Jun Zhao,et al. On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs , 2015, ANALCO.
[9] Stefanie Gerke,et al. Connectivity of the uniform random intersection graph , 2008, Discret. Math..
[10] Katarzyna Rybarczyk. The Coupling Method for Inhomogeneous Random Intersection Graphs , 2017, Electron. J. Comb..
[11] Jun Zhao,et al. $k$ -Connectivity in Random Key Graphs With Unreliable Links , 2015, IEEE Transactions on Information Theory.
[12] P. Erd Os,et al. On the strength of connectedness of random graphs , 1961 .
[13] Peter Marbach. A lower-bound on the number of rankings required in recommender systems using collaborativ filtering , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[14] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[15] Virgil D. Gligor,et al. Exact analysis of k-connectivity in secure sensor networks with unreliable links , 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[16] Katarzyna Rybarczyk,et al. Sharp threshold functions for the random intersection graph via coupling method , 2009, 0910.0749.
[17] Katarzyna Rybarczyk,et al. Diameter, connectivity, and phase transition of the uniform random intersection graph , 2011, Discret. Math..
[18] Douglas R. Stinson,et al. On the complexity of the herding attack and some related attacks on hash functions , 2012, Des. Codes Cryptogr..
[19] Armand M. Makowski,et al. Zero–One Laws for Connectivity in Random Key Graphs , 2009, IEEE Transactions on Information Theory.
[20] Béla Bollobás,et al. Random Graphs , 1985 .
[21] Armand M. Makowski,et al. Connectivity results for random key graphs , 2009, 2009 IEEE International Symposium on Information Theory.