1. Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks. In: Znati, T., et al. (eds.) Wireless Sensor Networks (2004)
2. Miller, S.P., Neuman, C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system. In: Project Athena Technical Plan (1987). Page section E.2.1
3. Huang, X., Shah, P., Sharma, D.: Fast algorithm in ECC for wireless sensor network. In: Proceeding of the International Multiconference of Engineers and Computer Scientist, vol. 2 (2010)
4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Symposium on Security and Privacy (2003)
5. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, November 2002