[1] Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Networks[C]//Proc. of the 9th ACM Conf. on Computer and Communications Security. New York, USA: ACM Press, 2002: 41-47.
[2] Blom R. An Optimal Class of Symmetric Key Generation Systems[C]//Proc. of Eurocrypt’84. Berlin, Germany: Springer- Verlag, 1984: 335-338.
[3] Blundo C, Santis A D, Herzberg A, et al. Perfectly Secure Key Distribution for Dynamic Conferences[C]//Proc. of the 12th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1992.
[4] Camtepe S A, Yener B. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks[C]//Proc. of ESORICS’04. Berlin, Germany: Springer-Verlag, 2004: 293-308.
[5] 李 明, 熊 焰, 苗付友. 基于网格的无线传感器网络预分配密钥机制[J]. 计算机工程, 2011, 37(19): 107-110.
[6] 蔡立军, 王 雷, 林亚平, 等. 传感器网络中基于DNA模型的对偶密钥建立算法研究[J]. 电子学报, 2008, 36(1): 171-176.
[7] Lipton R. Using DNA to Solve NP-complete Problems[J]. Science, 1995, 268(4): 542-545.
[8] Frank G, Makiko F. Carter B. Making DNA Add[J]. Science, 1996, 273(7): 220-223.
[9] Du Wenliang, Deng Jing, Han Y S, et al. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks[C]//Proc. of the 10th ACM Conf. on Computer and Communications Security. New York, USA: ACM Press, 2003: 42-51.
[10] Bollobás B, College T. Random Graphs[M]. [S. l.]: Cambridge University Press, 2001.
[11] 毛文波. 现代密码学理论与实践[M]. 北京: 电子工业出版社, 2006. |