-
2
-
-
77951592282
-
Delay- tolerant networking architecture
-
April
-
Cerf, V., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay- Tolerant Networking Architecture. IETF RFC 4838 (April 2007)
-
(2007)
IETF RFC 4838
-
-
Cerf, V.1
Hooke, A.2
Torgerson, L.3
Durst, R.4
Scott, K.5
Fall, K.6
Weiss, H.7
-
3
-
-
13944266651
-
A delay-tolerant network architecture for challenged internets
-
August
-
Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. SIGCOMM, August 25-29 (2003)
-
(2003)
SIGCOMM
, pp. 25-29
-
-
Fall, K.1
-
4
-
-
33947390867
-
When TCP breaks: Delay- and disruption-tolerant networking
-
DOI 10.1109/MIC.2006.91
-
Farrell, S., Cahill, V., Geraghty, D., Humphreys, I., McDonald, P.: When TCP Breaks: Delay- and Disruption Tolerant Networking. IEEE Internet Computing 10(4), 72-78 (2006) (Pubitemid 46444996)
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.4
, pp. 72-78
-
-
Farrell, S.1
Cahill, V.2
Geraghty, D.3
Humphreys, I.4
McDonald, P.5
-
5
-
-
67650690349
-
Bundle protocol specification
-
November
-
Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF RFC 5050 (November 2007)
-
(2007)
IETF RFC 5050
-
-
Scott, K.1
Burleigh, S.2
-
6
-
-
70349148299
-
A bundle of problems
-
Big Sky, Montana
-
Wood, L., Eddy, W., Holliday, P.: A Bundle of Problems. In: IEEE Aerospace Conference, Big Sky, Montana (2009)
-
(2009)
IEEE Aerospace Conference
-
-
Wood, L.1
Eddy, W.2
Holliday, P.3
-
7
-
-
84885885401
-
Bundle security protocol specification
-
September 9
-
Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle Security Protocol Specification. Work in progress as an internet-draft, draft-irtf-dtnrg-bundle-security-07. September 9 (2009)
-
(2009)
Work in Progress As An Internet-draft, draft-irtf-dtnrg-bundle-security- 07
-
-
Symington, S.1
Farrell, S.2
Weiss, H.3
Lovell, P.4
-
8
-
-
44649172478
-
DTN: An architectural retrospective
-
DOI 10.1109/JSAC.2008.080609, 4530739
-
Fall, K., Farrell, S.: DTN: An Architectural Retrospective. IEEE Journal on Selected Areas in Communication (JSAC) 26(5), 828-836 (2008) (Pubitemid 351780200)
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.5
, pp. 828-836
-
-
Fall, K.1
Farrell, S.2
-
9
-
-
34247271637
-
Delay-tolerant networking security overview
-
May 5
-
Farrell, S., Symington, S., Torgerson, L., Weiss, H., Lovell, P.: Delay-Tolerant Networking Security Overview. Work in progress as an internet-draft, draft-irtf-dtnrg-secoverview-05, May 5 (2009)
-
(2009)
Work in Progress As An Internet-draft, draft-irtf-dtnrg-secoverview-05
-
-
Farrell, S.1
Symington, S.2
Torgerson, L.3
Weiss, H.4
Lovell, P.5
-
10
-
-
84885885844
-
Security requirement for unidirectional lightweight encapsulation (ULE) protocol
-
March
-
Cruickshank, H., Pillai, P., Noisternig, M., Iyengar, S.: Security Requirement for Unidirectional Lightweight Encapsulation (ULE) Protocol. NWG RFC 5458 (March 2009)
-
(2009)
NWG RFC 5458
-
-
Cruickshank, H.1
Pillai, P.2
Noisternig, M.3
Iyengar, S.4
-
11
-
-
71449092160
-
Security analysis for delay/disruption tolerant satellite and sensor networks
-
Siena, Italy (September
-
Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)
-
(2009)
IWSSC 2009
-
-
Bhutta, M.1
Johnson, E.2
Ansa, G.3
Ahmed, N.4
Alsiyabi, M.5
Cruickshank, H.6
-
12
-
-
33947625881
-
-
National Institute of Standards and Technology, Interagency Report 7316 (September
-
Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of Access Control Systems. National Institute of Standards and Technology, Interagency Report 7316 (September 2006)
-
(2006)
Assessment of Access Control Systems
-
-
Hu, V.C.1
Ferraiolo, D.F.2
Kuhn, D.R.3
-
13
-
-
34548118365
-
Client\server access: Satellite-ATM connectivity using a knowledge management approach
-
DOI 10.1109/ITNG.2007.48, 4151790, Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
-
House, T.C.: Client/Server Access: Satellite-ATM Connectivity Using Knowledge Management Approach. In: 4th International Conference on Information Technology: New Generations, Nevada, pp. 863-867 (2007) (Pubitemid 47298563)
-
(2007)
Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
, pp. 863-867
-
-
House, T.C.1
-
14
-
-
35248853846
-
An efficient scheme for user authentication in wireless sensor networks
-
DOI 10.1109/AINAW.2007.80, 4221098, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/ Symposia, AINAW'07
-
Jiang, C., Li, B., Xu, H.: An Efficient Scheme for User Authentication in Wireless Sensor Networks. In: Advanced Information Networking and Applications Workshops, vol. 1, pp. 438-442 (May 2007) (Pubitemid 47565422)
-
(2007)
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
, vol.2
, pp. 438-442
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
16
-
-
49049083518
-
WATCHMAN: An overlay distributed AAA architecture for mobile ad hoc networks
-
March
-
Khakpour, A.R., Laurent-Maknavicius, M., Chaouchi, H.: WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad Hoc Networks. In: The International Conference on Availability, Reliability and Security, pp. 144-152 (March 2008)
-
(2008)
The International Conference on Availability, Reliability and Security
, pp. 144-152
-
-
Khakpour, A.R.1
Laurent-Maknavicius, M.2
Chaouchi, H.3
-
17
-
-
79952833342
-
Generic AAA architecture
-
August
-
de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA Architecture. NWG RFC 2903 (August 2000)
-
(2000)
NWG RFC 2903
-
-
De Laat, C.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
18
-
-
0037855622
-
AAA authorization framework
-
August
-
Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, G., Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., Spence, D.: AAA Authorization Framework. NWG RFC 2904 (August 2000)
-
(2000)
NWG RFC 2904
-
-
Vollbrecht, J.1
Calhoun, P.2
Farrell, S.3
Gommans, G.4
Gross, G.5
De Bruijn, B.6
De Laat, C.7
Holdrege, M.8
Spence, D.9
-
19
-
-
84889360026
-
-
Diameter, EAP, PKI and IP Mobility. John Wiley, Chichester
-
Nakhjiri, M., Nakhjiri, M.: AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility. John Wiley, Chichester (2005)
-
(2005)
AAA and Network Security for Mobile Access: Radius
-
-
Nakhjiri, M.1
Nakhjiri, M.2
-
20
-
-
0029700344
-
Decentralized trust management
-
May 6-8
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy, May 6-8, pp. 164-173 (1996)
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
21
-
-
84877027257
-
-
Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An Integration of Reputation-based and Policy-based Trust Management, http://rewerse.net/ publications/download/REWERSE-RP-2005-116.pdf
-
An Integration of Reputation-based and Policy-based Trust Management
-
-
Bonatti, P.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
22
-
-
0003226048
-
The keynote trust - Management system Version 2
-
September
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust - Management System Version 2. NWG RFC 2704 (September 1999)
-
(1999)
NWG RFC 2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
23
-
-
0001470602
-
REFEREE: Trust management for web applications
-
Chu, Y., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. Computer Networks and ISDN Systems 29(8-13), 953-964 (1997)
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
24
-
-
0003358457
-
SPKI certificate theory
-
September
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. NWG RFC 2693 (September 1999)
-
(1999)
NWG RFC 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
25
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
DOI 10.1109/2.970591
-
Kagal, L., Finin, T., Joshi, A.: Trust-based Security in Pervasive Computing Environments. IEEE Computer Magazine 34(12), 154-157 (2001) (Pubitemid 33129096)
-
(2001)
Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
26
-
-
84982899264
-
The role of trust management in distributed systems security
-
Vitek, J. (ed.) Secure Internet Programming. Springer, Heidelberg
-
Blaze, M., Feigenbaum, J., Lacy, J.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
|