Bag, S., Dhar, A., Sarkar, P.: 100% connectivity for location aware code based KPD in clustered WSN: merging blocks. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 136–150. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33383-5_9
CrossRef
Google Scholar
Bernasconi, A., Codenotti, B.: Spectral analysis of boolean functions as a graph eigenvalue problem. IEEE Trans. Comput. 48(3), 345–351 (1999)
MathSciNet
CrossRef
Google Scholar
Bose, M., Dey, A., Mukerjee, R.: Key predistribution schemes for distributed sensor networks via block designs. Des. Codes Crypt. 67(1), 111–136 (2013)
MathSciNet
CrossRef
MATH
Google Scholar
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985). doi:10.1007/3-540-39757-4_22
CrossRef
Google Scholar
Cameron, P.J.: Strongly regular graphs. Preprint (2001). http://designtheory.org/library/preprints/srg.pdf
Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004). doi:10.1007/978-3-540-30108-0_18
CrossRef
Google Scholar
Çamtepe, S.A., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. Technical report. Rensselaer Polytechnic Institute (2005)
Google Scholar
Carlet, C.: More ps and h-like bent functions (2015). http://eprint.iacr.org/2015/168
Chen, C.Y., Chao, H.C.: A survey of key predistribution in wireless sensor networks. Secur. Commun. Netw. (2011)
Google Scholar
Cusick, T.W., Stănică, P.: Cryptographic Boolean Functions and Applications. Academic Press, Elsevier (2009)
Google Scholar
Dhar, A., Sarkar, P.: Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Predistribution Using Reed Solomon Code (2011)
Google Scholar
Dillon, J.F.: A survey of bent functions. NSA Tech. J., 191–215, 1972
Google Scholar
Dillon, J.F.: Elementary Hadamard Difference sets. Ph.D thesis, University of Maryland (1974)
Google Scholar
Erdős, P., Rényi, A.: On the evolution of random graphs. In: Publication of the Mathematical Institute of the Hungarian Academy of Sciences, pp. 17–61 (1960)
Google Scholar
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM Press, New York (2002)
Google Scholar
Henry, K., Paterson, M.B., Stinson, D.R.: Practical approaches to varying network size in combinatorial key predistribution schemes. In: Lange, T., Lauter, K., Lisoněk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 89–117. Springer, Heidelberg (2014). doi:10.1007/978-3-662-43414-7_5
CrossRef
Google Scholar
Kantor, W.M.: Bent functions and spreads (2005). http://pages.uoregon.edu/kantor/PAPERS/Bent+spreadsFinal.pdf
Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: an authentication service for open network systems. In: USENIX Winter, pp. 191–202 (1988)
Google Scholar
Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004). doi:10.1007/978-3-540-30564-4_21
CrossRef
Google Scholar
Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2005, pp. 1200–1205 (2005)
Google Scholar
Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. 11(2), 1–35 (2008)
CrossRef
Google Scholar
Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Crypt. 71(3), 433–457 (2014)
MathSciNet
CrossRef
MATH
Google Scholar
Rothaus, O.S.: On bent functions. J. Comb. Theo. Ser. A 20, 300–305 (1976)
MathSciNet
CrossRef
MATH
Google Scholar
Ruj, S., Pal, A.: Preferential attachment model with degree bound and its application to key predistribution in WSN. In: 30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23–25, pp. 677–683, March 2016
Google Scholar
Ruj, S., Roy, B.K.: Key predistribution schemes using codes in wireless sensor networks. In: 4th International Conference on Information Security and Cryptology, Inscrypt 2008, Beijing, China, December 14–17, Revised Selected Papers, pp. 275–288 (2008)
Google Scholar
Stinson, D.R., Designs, C.: Constructions and Analysis. Springer, New York (2003)
Google Scholar
Wu, B.: PS bent functions constructed from finite pre-quasifield spreads (2013). http://arxiv.org/pdf/1308.3355.pdf
Wei, R., Wu, J.: Product Construction of Key Distribution Schemes for Sensor Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 280–293. Springer, Heidelberg (2004). doi:10.1007/978-3-540-30564-4_20
CrossRef
Google Scholar