Security considerations in space and delay tolerant networks
S Farrell, V Cahill - … for Information Technology (SMC-IT'06), 2006 - ieeexplore.ieee.org
This paper reviews the Internet-inspired security work on delay tolerant networking, in
particular, as it might apply to space missions, and identifies some challenges arising, for …
particular, as it might apply to space missions, and identifies some challenges arising, for …
Privacy and confidentiality in context-based and epidemic forwarding
Autonomic and opportunistic communications require specific routing algorithms, like
replication-based algorithms or context-based forwarding. In addition to confidentiality …
replication-based algorithms or context-based forwarding. In addition to confidentiality …
Delay/disruption tolerant network and its application in military communications
Z Lu, J Fan - 2010 International Conference On Computer …, 2010 - ieeexplore.ieee.org
With the gradual deepening and development of modern military warfare towards Network
Centric Warfare (NCW), the performance of network protocols will play an important role …
Centric Warfare (NCW), the performance of network protocols will play an important role …
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
A delay tolerant network (DTN) is a store carry and forward network characterized by highly
mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and …
mobile nodes, intermittent connectivity with frequent disruptions, limited radio range and …
An introduction to delay and disruption tolerant networks (DTNs)
Delay and disruption tolerant networking (DTN) is an exciting research topic that has
attracted increasing attention from many researchers. It focuses on the design, construction …
attracted increasing attention from many researchers. It focuses on the design, construction …
An efficient, scalable key transport scheme (eskts) for delay/disruption tolerant networks
In the past, security protocols including key transport protocols are designed with the
assumption that there are two parties communication with each other and an adversary tries …
assumption that there are two parties communication with each other and an adversary tries …
ID based cryptography and anonymity in delay/disruption tolerant networks
Due to the rapid development in technology, every network, application needs full time
connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) …
connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) …
[PDF][PDF] Securing kiosknet: A systems approach
SU Rahman, U Hengartner, U Ismail… - University of Waterloo …, 2007 - cs.uwaterloo.ca
Internet kiosks typically provide weak security guarantees and therefore cannot support
secure web access or transactionoriented applications such as banking and bill payment …
secure web access or transactionoriented applications such as banking and bill payment …
Security for Rural Public Computing
S Ur Rahman - 2008 - uwspace.uwaterloo.ca
Current research on securing public computing infrastructure like Internet kiosks has
focused on the use of smartphones to establish trust in a computing platform or to offload the …
focused on the use of smartphones to establish trust in a computing platform or to offload the …
[PDF][PDF] Secure key establishment for bundle security protocol of space DTNs in noninteractive manner
C Jadhav, B Dhainje, K Pradeep - Int. J. Comput. Sci. Inf. Technol, 2015 - Citeseer
DTN's ie Delay Tolerant Networks are emerging networks that are widely used in the
communication field for implementing a more efficient protocol to use the available …
communication field for implementing a more efficient protocol to use the available …