[1] M. Kubale, "Graph colorings," American Mathematical Society, ISBN 0-8218-3458-4, 2004.
[2] J. H. Van Lint, R. M. Wilson, "A course in combinatorics (2nd ed.)," Cambridge University Press, ISBN 0-521-80340-3, 2001.
[3] T. R. Jensen, B. Toft, "Graph coloring problems, "Wiley-Interscience, New York, ISBN 0-471-02865-7, 1995.
[4] L. Eschenauer and V. D. Gligor. "A key-management scheme for distributed sensor networks," In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
[5] A. Ahadipour, A. Keshavarz-Haddad, "A novel location-based key distribution scheme for large-scale stationary wireless networks," IEEE 12th International Iranian Society of Cryptology Information Security and Cryptology (ISCISC), Rasht, Iran, 2015.
[6] W. Du, J. Deng, Y. S. Han, P. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks," In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2003.
[7] D. Liu, P. Ning, "Establishing pairwise keys in distributed sensor networks," In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2003.
[8] R. Blom, "An optimal class of symmetric key generation systems," In Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EURO-CRYPT), 1984.
[9] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, "Perfectly-secure key distribution for dynamic conferences," In Proceedings of the 29th International Cryptology Conference (CRYPTO), 1993.
[10] H. Chan, A. Perrig, D. Song, "Random key pre-distribution schemes for sensor networks," In Proceedings of IEEE Symposium on Security and Privacy (SP), 2003.
[11] W. Du, J. Deng, Y. S. Han, Sh. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFO-COM), 2004.
[12] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A key pre-distribution scheme for sensor networks using deployment knowledge," IEEE Transactions on Dependable and Secure Computing, vol. 3, pp. 62-77, 2006.
[13] B. Kong, H. Chen, X. Tang, K. Sezaki, "Key pre-distribution schemes for large-scale wireless sensor networks using hexagon partition," IEEE Wireless Communications and Networking Conference (WCNC), 2010.
[14] F. Anjum, "Location dependent key management using random key- predistribution in sensor networks," Proceedings of the 5th ACM workshop on Wireless security, pp. 21-30, 2006.
[15] M. Faghani and S. Motahari, "Sectorized location dependent key management," Proceedings of Wireless and Mobile Computing, Networking and Communications, pp. 388-393, 2009.
[16] F. Anjum, "Location dependent key management in sensor networks without using deployment knowledge," Wireless Networks, vol. 16, no. 6, pp. 1587-1600, 2010.
[17] A. Gaur, S. Toshniwal, A. Prakash, D. P. Agrawal, "Enhanced location based key pre-distribution scheme for secure communication in Wireless Sensor Network (WSN)," IEEE 7th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2010.
[18] H. Fakhrey, S. Boussakta, R. Tiwari, Y. AlMathehaji, A. Bystrov, "Location-dependent key management protocol for a WSN with a random selected cell reporter," IEEE International Conference on Communications (ICC), 2015.
[19] R. Vaid, V. Katiyar, "VLKM: Virtual location- based key management scheme for Wireless Sensor Networks," International Conference on Parallel, Distributed and Grid Computing (PDGC), 2014.
[20] J. Choi, J. Bang, L. Kim, M. Ahn, T. Kwon, "Location-based key management strong against insider threats in wireless sensor networks," IEEE System Journal, pp. 1-9, Issue: 99, 2015.
[21] M. J. Duan, J. Xu, "An efficient location-based compromise-tolerant key management scheme for sensor networks," Information Processing Letters, pp. 503-507, 2011.
[22] C. Chen and H. Chao, "A survey of key distribution in wireless sensor networks," Security and Communication Networks, 7.12; pp. 24952508, 2014.
[23] Misra, Sudip and Zhang, Isaac and Misra, Subhas Chandra, "Guide to wireless Ad Hoc networks," Security in wireless Ad Hoc networks, p. 391-425, Springer London, 2009.
[24] S. H. Zanakis, A. Solomon, N. Wishart, S. Dublish, "Multi-attribute decision making: a simulation comparison of select methods," European Journal of Operational Research, vol. 107, no. 3, pp. 507529, 1998.
[25] C. Zopounidis, M. Doumpos, "Multicriteria classification and sorting methods: a literature review," European Journal of Operational Research, vol. 138, no. 2, pp. 229246, 2002.
[26] A. Jahan, F. Mustapha, M. Y. Ismail, S. M. Sapuan, M. Bahraminasab, "Acomprehensive VIKOR method for material selection," Materials and Design, vol. 32, no. 3, pp. 12151221, 2011.
[27] A. Chauhan, R. Vaish, "Pareto optimal microwave dielectric materials," Advanced Science, Engineering and Medicine, vol. 5, no. 2, pp. 149155, 2013.
[28] S. Marti, T. J. Giuli, K Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255-265. ACM, 2000.
[29] G. Wang, W. Zhang, G. Cao, and T. La Porta, "On supporting distributed collaboration in sensor networks," In IEEE Military Communications Conference (MILCOM'03), vol. 2, pp. 752-757, 2003.
[30] A. Seshadri, A. Perrig, L. Van Doorn, and P. Khosla, "Swatt: Software-based attestation for embedded devices," In Proceedings of IEEE Symposium on Security and Privacy, pp. 272-282, 2004.
[31] P. Erdos, A. Renyi, "On random graphs I," in Publ. Math. Debrecen 6, p. 290297, 1959.
[32] J. Spencer, "The strange logic of random graphs," Algorithms and Combinatorics 22, Springer- Verlag ISBN 3-540-41654-4, 2000.