1- J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of network and computer applications, vol. 33, no. 2, pp. 63-75, Mar. 2010.
2- C. Y. Chen and H. C. Chao, "A survey of key distribution in wireless sensor networks," Security and Communication Networks, vol. 7, no. 12, pp. 2495-2508, July 2014.
3- M. Anzani, H. H. S. Javadi, and A. Moeni, "A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme," Iranian Journal of Science and Technology, Transactions A: Science, vol. 42, no. 2, pp. 777-786, July 2018.
4- H. Haj Seyyed Javadi and M. Anzani, "Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design," Journal of Advances in Computer Engineering and Technology, vol. 1, no. 3, pp. 33-38, Apr. 2015.
5- K. Alhamazani et al., "An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art," Computing, vol. 97, no. 4, pp. 357-377, Apr. 2015.
6- M. Ali et al., "SeDaSC: Secure data sharing in clouds," IEEE Systems Journal, vol. 11, no. 2, pp. 395-404, June 2015.
7- B. Guan, J. Wu, Y. Wang, and S. U. Khan, "CIVSched: A communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs," IEEE trans. cloud computing, vol. 2, no. 3, pp. 320-332, July 2014.
8- S. H. Erfani, H. H. Javadi, and A. M. Rahmani, "A dynamic key management scheme for dynamic wireless sensor networks," Security and Communication Networks, vol. 8, no. 6, pp. 1040-1049, Apr. 2015.
9- V. Modiri, H. H. S. Javadi, A. M. Rahmani, and M. Anzani, "Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks," Information Systems & Telecommunication, p. 53, Feb. 2020.
10- L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, Nov. 2002.
11- D. Stinson, Combinatorial designs: constructions and analysis. Springer Science & Business Media, 2007.
12- N. S. Esfehani and H. H. S. Javadi, "A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network," Wireless Networks, vol. 27, no. 4, pp. 3025-3052, May. 2021.
13- J. Dong, D. Pei, and X. Wang, "A key predistribution scheme based on 3-designs," in International Conference on Information Security and Cryptology, pp. 81-92: Springer, Sept. 2007.
14- H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in 2003 Symposium on Security and Privacy, IEEE, pp. 197-213, May. 2003.
15- P. Schaffer, K. Farkas, A. Horvath, T. Holczer, and L. Buttyan, "Secure and reliable clustering in wireless sensor networks: a critical survey," Computer Networks, vol. 56, no. 11, pp. 2726-2741, July 2012.
16- S. A. Camtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," in European symposium on research in computer security, pp. 293-308: Springer, 2004.
17- C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Annual international cryptology conference, pp. 471-486: Springer, May. 1992.
18- R. Blom, "An optimal class of symmetric key generation systems," in Workshop on the Theory and Application of of Cryptographic Techniques, pp. 335-338: Springer, Dec. 1984.
19- D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 1, pp. 41-77, Feb. 2005.
20- I. Anderson, Combinatorial designs: construction methods. Ellis Horwood Chichester, 1990.
21- A. Pattanayak and B. Majhi, "Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited," IACR Cryptol. ePrint Arch., vol. 2009, pp. 131, 2009.
22- J. Lee and D. R. Stinson, "A combinatorial approach to key predistribution for distributed sensor networks," in IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1200-1205, Oct. 2005.
23- P. N. Bahrami, H. H. Javadi, T. Dargahi, A. Dehghantanha, and K. K. R. Choo, "A hierarchical key pre-distribution scheme for fog networks," Concurrency and Computation: Practice and Experience, vol. 31, no. 22, pp. e4776, Aug. 2019.
24- W. Bechkit, Y. Challal, and A. Bouabdallah, "A new class of Hash-Chain based key pre-distribution schemes for WSN," Computer communications, vol. 36, no. 3, pp. 243-255, Feb. 2013.
25- M. Javanbakht, H. Erfani, H. H. S. Javadi, and P. Daneshjoo, "Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs," Security and Communication Networks, vol. 7, no. 11, pp. 2003-2014, Jan. 2014.
26- T. Dargahi, H. H. Javadi, and M. Hosseinzadeh, "Application specific hybrid symmetric design of key pre-distribution for wireless sensor networks," Security and Communication Networks, vol. 8, no. 8, pp. 1561-1574, Sept. 2015.
27- V. Modiri, H. H. S. Javadi, and M. Anzani, "A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design," Wireless Personal Communications, vol. 96, no. 2, pp. 2821-2841, June 2017.
28- M. Anzani, H. H. S. Javadi, and V. Modirir, "Key-management scheme for wireless sensor networks based on merging blocks of symmetric design," Wireless Networks, vol. 24, no. 8, pp. 2867-2879, Apr. 2018.
29- N. Masaeli, H. H. S. Javadi, and S. H. Erfani, "Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds," Journal of Information Security and Applications, vol. 54, pp. 102519, Oct. 2020.
30- W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, "A highly scalable key pre-distribution scheme for wireless sensor networks," IEEE trans. wireless communications, vol. 12, no. 2, pp. 948-959, Feb. 2013.
31- J. Lee and D. R. Stinson, "On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs," ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 2, pp. 1-35, May. 2008.