-
1
-
-
77249094411
-
Multicasting in Delay Tolerant Networks: A Social Network Perspective
-
W. Gao, Q. Li, B. Zhao and G. Cao, "Multicasting in Delay Tolerant Networks: A Social Network Perspective," Proc. ACM Mobihoc'09, 2009.
-
Proc. ACM Mobihoc'09, 2009
-
-
Gao, W.1
Li, Q.2
Zhao, B.3
Cao, G.4
-
2
-
-
40749113163
-
Efficient routing in intermittently connected mobile networks: The multiple-copy cast
-
Feb
-
T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: the multiple-copy cast," IEEE/ACM Trans. on Networking, vol. 16, no. 1, pp. 77-89, Feb. 2008.
-
(2008)
IEEE/ACM Trans. on Networking
, vol.16
, Issue.1
, pp. 77-89
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
3
-
-
70349684505
-
Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets
-
F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets," Proc. of INFOCOM' 09, 2009.
-
Proc. of INFOCOM' 09, 2009
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
4
-
-
70350238158
-
SMART: A Secure Multi-Layer Credit based Incentive Scheme for Delay-Tolerant Networks
-
H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A Secure Multi-Layer Credit based Incentive Scheme for Delay-Tolerant Networks," IEEE Trans. on Vehicular Technology, vol.58, no. 8, pp. 4628-4639, 2009.
-
(2009)
IEEE Trans. on Vehicular Technology
, vol.58
, Issue.8
, pp. 4628-4639
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Fan, Y.4
Shen, X.5
-
5
-
-
51349140660
-
-
Nokia Research Center, Tech. Rep. NRC-TR-2007-007
-
N. Asokan, K. Kostianinen, P. Ginzboorg, J. Ott, and C. Luo, "Towards securing disruption-tolerant networking," Nokia Research Center, Tech. Rep. NRC-TR-2007-007.
-
Towards Securing Disruption-tolerant Networking
-
-
Asokan, N.1
Kostianinen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
7
-
-
44649172478
-
DTN: An architectural retrospective
-
June
-
K. Fall and S. Farrell, "DTN: An architectural retrospective," IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 828-836, June 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.5
, pp. 828-836
-
-
Fall, K.1
Farrell, S.2
-
8
-
-
34247251606
-
-
draft-irtf-dtnrg-bundle-security-08.txt, work-in-progress, March
-
S. Symington, S. Farrell, H. Weiss and P. Lovell, "Bundle security protocol specification," draft-irtf-dtnrg-bundle-security-08.txt, work-in-progress, March, 2009.
-
(2009)
Bundle Security Protocol Specification
-
-
Symington, S.1
Farrell, S.2
Weiss, H.3
Lovell, P.4
-
10
-
-
35448931599
-
Applicability of identity-based cryptography for disruption-tolerant networking
-
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott and Cheng Luo, "Applicability of identity-based cryptography for disruption-tolerant networking," Proc. of MobiOpp'07, June 2007.
-
Proc. of MobiOpp'07, June 2007
-
-
Asokan, N.1
Kostiainen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
12
-
-
38049146172
-
Batch verification of short signatures
-
EUROCRYPT 2007
-
J.L. Camenisch, S. Hohenberger, M.Pedersen,"Batch verification of short signatures," EUROCRYPT 2007, LNCS, vol. 4515, pp.246-263, 2007.
-
(2007)
LNCS
, vol.4515
, pp. 246-263
-
-
Camenisch, J.L.1
Hohenberger, S.2
Pedersen, M.3
-
13
-
-
84946840347
-
Short signature from the Weil Pairing
-
D. Boneh, B. Lynn, H. Shacham, "Short signature from the Weil Pairing," ASIACRYPT 2001, vol.2248, pp.514-532, 2001.
-
(2001)
ASIACRYPT 2001
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
14
-
-
84995447473
-
Practical Short Signature Batch Verification
-
A. L. Ferrara, M. Green, S. Huhenberger and M. Pedersen, "Practical Short Signature Batch Verification," Proc. of CT-RSA 2009, 2009.
-
Proc. of CT-RSA 2009, 2009
-
-
Ferrara, A.L.1
Green, M.2
Huhenberger, S.3
Pedersen, M.4
-
15
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," Proc. of PKC'03, vol. 2567, pp. 18-30. 2003.
-
(2003)
Proc. of PKC'03
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
16
-
-
35248867510
-
Efficient identity-based signature schemes based on pairing
-
SAC 2002
-
F.Hess, "Efficient identity-based signature schemes based on pairing,", SAC 2002, LNCS, vol. 2595, pp. 310-324, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
17
-
-
77953317265
-
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
-
B. J. Matt, "Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures," PKC 2009, 2009.
-
(2009)
PKC 2009
-
-
Matt, B.J.1
-
18
-
-
84920380941
-
Protocols for public key cryptosystems
-
R. Merkle, "Protocols for public key cryptosystems," Proc. of IEEE S&P, pp. 122-133, 1980.
-
(1980)
Proc. of IEEE S&P
, pp. 122-133
-
-
Merkle, R.1
-
19
-
-
70349270769
-
Efficient security primitives derived from a secure aggregation algorithm
-
H. Chan and A. Perrig, "Efficient security primitives derived from a secure aggregation algorithm," Proc. of CCS'08, 2008.
-
Proc. of CCS'08, 2008
-
-
Chan, H.1
Perrig, A.2
-
22
-
-
84872477069
-
-
The One Simulator: http://www.netlab.tkk.fi/tutkimus/dtn/theone/.
-
The One Simulator
-
-
-
24
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks
-
K. Ren, W. Lou and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," Proc. of SECON'07, 2007.
-
Proc. of SECON'07, 2007
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
25
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
Y. Zhang, W. Liu,W. Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no.2, pp.247-260, 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|