1. Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks;Azarderskhsh;EURASIP Journal on Wireless Communications and Networking,2011
2. R. Blom, Theory and application of cryptographic techniques, in: Proc. of the Eurocrypt Workshop on Advances in Cryptology, April 1985, pp. 335–338.
3. Perfectly secure key distribution for dynamic conferences;Blundo;Information and Computation,1998
4. IKM—an identity based key management scheme for heterogeneous sensor networks;Boujelben;Journal on Communications,2011
5. Combinatorial design of key distribution mechanisms for wireless sensor networks;Camtepe;IEEE/ACM Transactions on Networking (TON),2007