{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:00:53Z","timestamp":1729677653808,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6875009","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"1131-1135","source":"Crossref","is-referenced-by-count":17,"title":["On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on\/off channels"],"prefix":"10.1109","author":[{"given":"Jun","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Osman","family":"Yagan","sequence":"additional","affiliation":[]},{"given":"Virgil","family":"Gligor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-642-18009-5_5","article-title":"Component evolution in general random intersection graphs","author":"bradonjic?","year":"2010","journal-title":"Workshop on Algorithms and Models for the Web-Graph (WAW)"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1214\/105051605000000575"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039959"},{"key":"36","doi-asserted-by":"crossref","DOI":"10.21236\/ADA609112","author":"zhao","year":"2014","journal-title":"Results on Vertex Degree and K- Connectivity in Uniform S-intersection Graphs"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22993-0_49"},{"key":"33","first-page":"547","article-title":"Critical power for asymptotic connectivity in wireless networks","author":"gupta","year":"1998","journal-title":"Proc IEEE CDC"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1214\/EJP.v18-2277"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20342"},{"key":"16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.37236\/2786","article-title":"Degree distribution of an inhomogeneous random intersection graph","volume":"20","author":"bloznelis","year":"2013","journal-title":"The Electronic Journal of Combinatorics"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614334"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620734"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1214\/12-AAP874"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.06.047"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2009.03.042"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736615"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2006.05.013"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1002\/jgt.20489"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s10474-012-0266-8"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.01.006"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s00440-012-0428-1"},{"journal-title":"Connectivity of Soft Random Geometric Graphs","year":"2013","author":"penrose","key":"41"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874832"},{"key":"45","doi-asserted-by":"crossref","DOI":"10.21236\/ADA564307","author":"tseng","year":"2012","journal-title":"Parameter-Independent Iterative Approximate Byzantine Consensus"},{"journal-title":"K-connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On\/off Channel Model","year":"2012","author":"zhao","key":"44"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20005"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jctb.2004.09.005"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00493-006-0022-1"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.114"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.41"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1017\/S0269964809990064"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875260"},{"key":"27","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","article-title":"On random graphs, I","volume":"6","author":"erdos","year":"1959","journal-title":"Publicationes Mathematicae"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/9781118032718"},{"key":"29","first-page":"261","article-title":"On the strength of connectedness of random graphs","author":"erdos","year":"1961","journal-title":"Acta Math Acad Sci Hungar"},{"journal-title":"Topological Properties of Wireless Sensor Networks under the Q-composite Key Predistribution Scheme with Unreliable Links","year":"2014","author":"zhao","key":"3"},{"key":"2","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc of IEEE Symposium on Security and Privacy"},{"key":"10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.37236\/523","article-title":"Sharp threshold functions for the random intersection graph via a coupling method","volume":"18","author":"rybarczyk","year":"2011","journal-title":"The Electronic Journal of Combinatorics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"journal-title":"The Phase Transition in Inhomogeneous Random Intersection Graphs","year":"2013","author":"bradonjic?","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2011.05.029"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620654"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706098"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2189353"},{"key":"31","doi-asserted-by":"crossref","first-page":"2993","DOI":"10.1090\/S0002-9939-96-03732-X","article-title":"Every monotone graph property has a sharp threshold","volume":"124","author":"friedgut","year":"1996","journal-title":"Proceedings of the American Mathematical Society"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/net.20256"},{"key":"9","article-title":"Brief encounters with a random key graph","author":"gligor","year":"2013","journal-title":"Proc of Security Protocols Workshop (SPW) 2009"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2181331"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06875009.pdf?arnumber=6875009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T04:08:56Z","timestamp":1689480536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6875009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6875009","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}