-
2
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets
-
Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. In: ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27-34 (2003)
-
(2003)
ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 27-34
-
-
Fall, K.1
-
4
-
-
33947390867
-
When TCP breaks: Delay- and disruption-tolerant networking
-
DOI 10.1109/MIC.2006.91
-
Farrell, S., Cahill, V., Geraghty, D., Humphreys, I., MacDonald, P.: When TCP Breaks: Delay-and Disruption-Tolerant Networking. IEEE Internet Computing 10(4), 72-78 (2006) (Pubitemid 46444996)
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.4
, pp. 72-78
-
-
Farrell, S.1
Cahill, V.2
Geraghty, D.3
Humphreys, I.4
McDonald, P.5
-
5
-
-
84885884240
-
A message-switched architecture for challenged internets
-
Fall, K.: A Message-Switched Architecture for Challenged Internets. Intel Research Berkeley. IRB-TR-02-010 (2002)
-
(2002)
Intel Research Berkeley. IRB-TR-02-010
-
-
Fall, K.1
-
6
-
-
77951592282
-
Delay-tolerant networking architecture
-
Network Working Group
-
Cerf, V., et al.: Delay-Tolerant Networking Architecture. RFC 4838, Network Working Group (2007)
-
(2007)
RFC 4838
-
-
Cerf, V.1
-
8
-
-
71449092160
-
Security analysis for delay/disruption satellite and sensor networks
-
Siena Italy
-
Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Satellite and Sensor Networks. In: IWSSC 2009, Siena Italy (2009)
-
(2009)
IWSSC 2009
-
-
Bhutta, N.1
Ansa, G.2
Johnson, E.3
Ahmad, N.4
Alsiyabi, M.5
Cruickshank, H.6
-
10
-
-
34247271637
-
-
DTN Research Group Internet Draft (draft-irtf-dtnrg-sec-overview-06)
-
Farrell, S., et al.: Delay Tolerant Networking Security Overview. DTN Research Group, Internet Draft (draft-irtf-dtnrg-sec-overview-06) (2009)
-
(2009)
Delay Tolerant Networking Security Overview
-
-
Farrell, S.1
-
11
-
-
84885886767
-
Delay tolerant networking with satellites: Overview and research directions
-
Telecom Paris
-
Franck, L.: Delay Tolerant Networking with Satellites: Overview and Research Directions. In: COST272 - 7th MCM, Telecom Paris (2004)
-
(2004)
COST272 - 7th MCM
-
-
Franck, L.1
-
15
-
-
84949979635
-
DoS-resistant authentication with client puzzles
-
Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. Springer, Heidelberg
-
Aura, T., Nikander, P., Leiwo, J.: DoS-resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 178-181. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2133
, pp. 178-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
18
-
-
0347470584
-
Fail-stop protocols: An approach to designing secure protocols
-
Gong, L., Syverson, P.: Fail-stop Protocols: An Approach to Designing Secure Protocols. In: Proc. of IFIP DCCA-5, Illinois (1995)
-
(1995)
Proc. of IFIP DCCA-5, Illinois
-
-
Gong, L.1
Syverson, P.2
-
19
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology - CRYPTO '96
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996) (Pubitemid 126106226)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
|