[3] Mu K, Li L. An efficient pairwise key predistribution scheme for wireless sensor networks [J]. Journal of Networks, 2014, 9(2): 277-282.
[4] Tanuja R, Arudi S P, Manjula S H, et al. TKP: Three level key pre-distribution with mobile sinks for wireless sensor networks [C]. IEEE International Conference on Signal Processing, 2015: 1-5.
[8] Chen Chinling, Tsai Yuting, Castiglione A, et al. Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks [J]. Computer Science and Information Systems, 2013, 10(2): 589-609.
[9] Chang Xinfeng, Sun Yanan. A key pre-distribution scheme based on polynomial for wireless sensor networks [J]. Computer and Digital Engineering, 2014, 42(11): 2117-2201.
[11] Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks [C]. Proceeding of the 10th ACM Conference on Computer and Communications Security, Washington: ACM, 2003, 2(4): 62-72.
[12] Oliveira L B, Aranha D F, Gouvea P L, et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks [J]. Computer Communications, 2011, 34(3): 485-493.
[17] Zhou J D, How G, Wu S J. Controlled teleportation of an arbitrary multi-qubit state in a general form with d-dimensional Greenberger-Horne-Zeilinger states [J]. Chinese Physics Letters, 2007, 24: 1151-1153.