Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signa
β¦ LIBER β¦
ARDEN: Anonymous networking in delay tolerant networks
β Scribed by Cong Shi; Xiapu Luo; Patrick Traynor; Mostafa H. Ammar; Ellen W. Zegura
- Book ID
- 113418604
- Publisher
- Elsevier Science
- Year
- 2012
- Tongue
- English
- Weight
- 766 KB
- Volume
- 10
- Category
- Article
- ISSN
- 1570-8705
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
An efficient anonymous authentication me
β
Renwang Su; Zhenfu Cao
π
Article
π
2010
π
Elsevier Science
π
English
β 376 KB
From Delay-Tolerant Networks to Vehicula
β
Pereira, Paulo Rogerio; Casaca, Augusto; Rodrigues, Joel J. P. C.; Soares, Vasco
π
Article
π
2012
π
IEEE
π
English
β 1015 KB
Delay management in delay-tolerant netwo
β
Qunwei Zheng; Xiaoyan Hong; Pu Wang; Lei Tang; Jun Liu
π
Article
π
2008
π
John Wiley and Sons
π
English
β 840 KB
## Abstract In delayβtolerant networks (DTN), nodes explore various opportunities to connect and communicate with each other. A series of encounters of different nodes will create such opportunities and spread a message among many nodes and eventually deliver to the designated destination. We study
Efficient Authentication and Key Agreeme
β
Ding, Yan; Zhou, Xian-wei; Cheng, Zhi-mi; Zeng, Wen-lu
π
Article
π
2012
π
Springer US
π
English
β 458 KB
Delay- and Disruption-Tolerant Networkin
β
McMahon, A.; Farrell, S.
π
Article
π
2009
π
IEEE
π
English
β 996 KB
Exploiting resource heterogeneity in del
β
Gabriel Sandulescu; PΓ©ter Schaffer; Simin Nadjm-Tehrani
π
Article
π
2013
π
John Wiley and Sons
π
English
β 957 KB