Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
- 19 July 2012
- journal article
- Published by Springer Science and Business Media LLC in Wireless Personal Communications
- Vol. 70 (4), 1473-1485
- https://doi.org/10.1007/s11277-012-0760-x
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networksJournal of Network and Computer Applications, 2011
- An IBE scheme using ECC combined public keyComputers and Electrical Engineering, 2010
- An efficient anonymous authentication mechanism for delay tolerant networksComputers and Electrical Engineering, 2010
- Chain store game based channel allocation in cognitive radio systemThe Journal of China Universities of Posts and Telecommunications, 2010
- An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystemComputers & Security, 2009
- SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant NetworksIEEE Transactions on Vehicular Technology, 2009
- CPK-Based Authentication and Key Agreement Protocols with Anonymity for Wireless NetworkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- A New Key Management and Authentication Method for WSN Based on CPKPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Delay-Tolerant Networking ArchitecturePublished by RFC Editor ,2007
- Security Considerations in Space and Delay Tolerant NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006