메뉴 건너뛰기




Volumn , Issue , 2007, Pages 52-56

Applicability of identity-based cryptography for disruption-tolerant networking

Author keywords

Disruption and delay tolerant networking; Identity based cryptography; Initializing security

Indexed keywords

DELAY-TOLERANT NETWORKING (DTNS); IDENTITY-BASED CRYPTOGRAPHY (IBC);

EID: 35448931599     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1247694.1247705     Document Type: Conference Paper
Times cited : (67)

References (8)
  • 1
    • 13944266651 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets
    • August
    • K. Fall, "A delay-tolerant network architecture for challenged internets," in Proc. SIGCOMM, August 2003.
    • (2003) Proc. SIGCOMM
    • Fall, K.1
  • 2
    • 33749041735 scopus 로고    scopus 로고
    • A. Seth, U. Hengartner, and S. Keshav, Practical security for disconnected nodes, in First Workshop on Secure Network Protocols (NPSec), November 2005. Revised 2006 version of the NPSec paper http://www.cs.uwaterloo.ca/~a3seth/practical.security.v2.pdf.
    • A. Seth, U. Hengartner, and S. Keshav, "Practical security for disconnected nodes," in First Workshop on Secure Network Protocols (NPSec), November 2005. Revised 2006 version of the NPSec paper http://www.cs.uwaterloo.ca/~a3seth/practical.security.v2.pdf.
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • CRYPTO 2001, Advances in Cryptology, no, in, Springer-Verlag, August
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO 2001, Advances in Cryptology, no. 2139 in Lecture Notes in Computer Science, pp. 213-229, Springer-Verlag, August 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.