1. Bollobs, B. (1985). Random graphs. NY :Acadamic Press Inc.
2. Boneh, D., & Franlin, M. (2001). Identity-based encryption from the weil pairing. In CRYPTO, pp. 213–229. Berlin: Springer.
3. Carman, D., Matt, B., Kruus, P., Balenson, D., & Branstad, D. (2000). Key management in ditributed sensor networks. In DARPA Sensor IT Workshop.
4. Chan, H., & Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. Miami, FL: INFOCOM.
5. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy, pp. 197–213, Berkeley, California, May.