1. Blom R (1982) Non-public key distribution. In: Advances in cryptology—CRYPTO 82, pp 231–236
2. Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: CRYPTO ’92: proceedings of the 12th annual international cryptology conference on advances in cryptology, London, UK, 1993. Springer, New York, pp 471–486. ISBN 3-540-57340-2
3. Bulusu V, Durresi A, Paruchuri V, Durresi M, Jain R (2006) Key distribution in mobile heterogeneous sensor networks. In: Global telecommunications conference, 2006. GLOBECOM ’06. IEEE, New York, pp 1–5. ISBN 1-4244-0356-1
4. Chan H, Perrig A (2005) Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies, pp 524–535. ISBN 0-7803-8968-9
5. Chan H, Perrig A, Song D (2003) Random key pre-distribution schemes for sensor networks. In: IEEE symposium on security and privacy, May 2003, pp 197–213