[1] |
FARRELL S , CAHILL V . Security considerations in space and delay tolerant networks[C]// IEEE International Conference on Space Mission Challenges Fox Information Technology. 2006: 29-38.
|
[2] |
谢永明 . 基于分布式密钥产生系统的延迟容忍网络安全研究[D]. 长沙:中南大学, 2012.
|
|
XIE Y M . Research on delay tolerant network security based on the distributed key generation system[D]. Changsha:Central South University, 2012.
|
[3] |
SETH A , KESHAV S . Practical security for disconnected nodes[C]// The International Conference on Secure Network Protocols. 2005: 31-36.
|
[4] |
KATE A , ZAVERUCHA G M , HENGARTNER U . Anonymity and security indelay tolerant networks[C]// The International Conference onSecurity and Privacy in Communications Networks and the Workshops. 2007: 504-513.
|
[5] |
ASOKAN N , KOSTIAINEN K , GINZBOORG P . Towards securing disruption tolerant networking[R]. 2007.
|
[6] |
DEFRAWY K E , SOILS J , TSUDIK G . Leveraging social contacts for message confidentiality in delay tolerant networks[C]// IEEE International Computer Software and Applications Conference. 2009: 271-279.
|
[7] |
BHUTTA N , ANSA G , JOHNSON E . Security analysis for delay/disruption tolerant satellite and sensor networks[C]// The International Workshop on Satellite and Space Communications. 2009: 385-389.
|
[8] |
BURGESS J , BISSIASG D , COMER M D ,et al. Surviving attackson disruption tolerant networks without authentication[C]// ACM International Symposium on Mobile Ad Hoc Networking and Computting. 2007: 61-70.
|
[9] |
李发根, 胡予濮, 李刚 . 一个高效的基于身份的签密方案[J]. 计算机学报, 2006,29(9): 1641-1647.
|
|
LI F G , HU Y P , LI G . An efficient identity-based signcryption scheme[J]. Journal of Computers, 2006,29(9): 1641-1647.
|