Amanote Research

Amanote Research

    RegisterSign In

Authenticated Key Exchange (AKE) in Delay Tolerant Networks

IFIP Advances in Information and Communication Technology - United States
doi 10.1007/978-3-642-30436-1_5
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer NetworksInformation SystemsManagementCommunications
Date

January 1, 2012

Authors
Sofia Anna MenesidouVasilios Katos
Publisher

Springer Berlin Heidelberg


Related search

Automated Key Exchange Protocol Evaluation in Delay Tolerant Networks

Computers and Security
LawComputer Science
2016English

Authenticated Key Exchange and Key Encapsulation in the Standard Model

English

Delay-Tolerant Networking in Restricted Networks

2011English

Pseudonymised Communication in Delay Tolerant Networks

2011English

Robust Streaming in Delay Tolerant Networks

2010English

Strongly Secure Authenticated Key Exchange Without NAXOS’ Approach

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange

2017English

Public-Key Infrastructure Validation and Revocation Mechanism Suitable for Delay/Disruption Tolerant Networks

IET Information Security
Computer NetworksSoftwareInformation SystemsCommunications
2017English

Space Optimized Multicast in Delay Tolerant Networks

International Journal of Computing and Network Technology
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy