{"id":"https://openalex.org/W2144085838","doi":"https://doi.org/10.1109/isit.2009.5206014","title":"Connectivity results for random key graphs","display_name":"Connectivity results for random key graphs","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2144085838","doi":"https://doi.org/10.1109/isit.2009.5206014","mag":"2144085838"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2009.5206014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5206014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064066193","display_name":"Osman Ya\u011fan","orcid":"https://orcid.org/0000-0002-7057-2966"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Osman Yagan","raw_affiliation_strings":["Department of Electrical and Computer Engineering and the Institute of Systems Research, University of Maryland, College Park, College Park, MD, USA","Department of Electrical and Computer Engineering and the Institute for Systems Research, University of Maryland at College Park, 20742, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering and the Institute of Systems Research, University of Maryland, College Park, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering and the Institute for Systems Research, University of Maryland at College Park, 20742, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037696481","display_name":"Armand M. Makowski","orcid":"https://orcid.org/0000-0002-3686-3508"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Armand M. Makowski","raw_affiliation_strings":["Department of Electrical and Computer Engineering and the Institute of Systems Research, University of Maryland, College Park, College Park, MD, USA","Department of Electrical and Computer Engineering and the Institute for Systems Research, University of Maryland at College Park, 20742, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering and the Institute of Systems Research, University of Maryland, College Park, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering and the Institute for Systems Research, University of Maryland at College Park, 20742, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064066193"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":3.7713,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.93814313,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2403","last_page":"2407"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-graph","display_name":"Random graph","score":0.7781144380569458},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.616172194480896},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5954002141952515},{"id":"https://openalex.org/keywords/random-geometric-graph","display_name":"Random geometric graph","score":0.5402209162712097},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4843391180038452},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46882009506225586},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.33161628246307373},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29698845744132996},{"id":"https://openalex.org/keywords/line-graph","display_name":"Line graph","score":0.23923563957214355},{"id":"https://openalex.org/keywords/voltage-graph","display_name":"Voltage graph","score":0.23689237236976624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11126619577407837}],"concepts":[{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.7781144380569458},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.616172194480896},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5954002141952515},{"id":"https://openalex.org/C30609935","wikidata":"https://www.wikidata.org/wiki/Q7291969","display_name":"Random geometric graph","level":5,"score":0.5402209162712097},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4843391180038452},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46882009506225586},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.33161628246307373},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29698845744132996},{"id":"https://openalex.org/C203776342","wikidata":"https://www.wikidata.org/wiki/Q1378376","display_name":"Line graph","level":3,"score":0.23923563957214355},{"id":"https://openalex.org/C22149727","wikidata":"https://www.wikidata.org/wiki/Q7940747","display_name":"Voltage graph","level":4,"score":0.23689237236976624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11126619577407837}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2009.5206014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5206014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2008111483","https://openalex.org/W2041282222","https://openalex.org/W2089421240","https://openalex.org/W2106225269","https://openalex.org/W2116269350","https://openalex.org/W2155003029","https://openalex.org/W3211513184"],"related_works":["https://openalex.org/W2782929340","https://openalex.org/W2179240077","https://openalex.org/W59125150","https://openalex.org/W2963133557","https://openalex.org/W1590359421","https://openalex.org/W2130919150","https://openalex.org/W2155003029","https://openalex.org/W4214904560","https://openalex.org/W1578200831","https://openalex.org/W57782380"],"abstract_inverted_index":{"The":[0],"random":[1,6,11],"key":[2,12],"graph":[3,7,36],"is":[4],"the":[5,10,20],"induced":[8],"by":[9],"predistribution":[13],"scheme":[14],"of":[15,22],"Eschenauer":[16],"and":[17,38],"Gligor":[18],"under":[19],"assumption":[21],"full":[23],"visibility.":[24],"We":[25],"report":[26],"on":[27],"recent":[28],"results":[29],"concerning":[30],"a":[31],"conjectured":[32],"zero-one":[33],"law":[34],"for":[35,42],"connectivity,":[37],"provide":[39],"an":[40],"outline":[41],"its":[43],"proof.":[44]},"counts_by_year":[{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
