"Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security"
written by Harminder Singh Bindra, Amrit Lal Sangal,
published by Wireless Sensor Network, Vol.2 No.8, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Flooding and Forwarding Based on Efficient Routing Protocol
2020
[2] Architecture, an Efficient Routing, Applications, and Challenges in Delay Tolerant Network
2019
[3] Current State of Multicast Routing Protocols for Disruption Tolerant Networks: Survey and Open Issues
2019
[4] Performance Modeling of Licklider Transmission Protocol (LTP) via Proactive Transmission of Signaling Segments in Deep-space Network
2018
[5] A Security Scheme to Mitigate Denial of Service Attacks in Delay Tolerant Networks
2017
[6] 可持续无线网络方向本科生科研教学研究——美国国家科学基金本科生科研教学项目概述 (英文) Undergraduate Education and Research in Sustainable Wireless …
2016
[7] Group Key Exchange Management in Delay Tolerant Network
2016
[8] A heuristic light weight security algorithm for resource constrained DTN routing
2016
[9] 可持续无线网络方向本科生科研教学研究——美国国家科学基金本科生科研教学项目概述 (英文) Undergraduate Education and Research in Sustainable Wireless …
2016
[10] A survey on current status of Disruption Tolerant Network support for Multicast
2016
[11] A Survey of Routing and Data Dissemination in Delay Tolerant Networks
Journal of Network and Computer Applications, 2016
[12] Analysis of Delay Tolerant Network Routers by Implementing Selfish Node Detection Algorithm with an Incentive Strategy
2016
[13] IMPLEMENTATION AND ANALYSIS OF IDENTITY SPOOFING ATTACK USING EPIDEMIC ROUTING PROTOCOL IN DTN
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH, 2015
[14] Malware discovery in deferral tolerant set of connections
IJMCA, 2015
[15] A Survey on Various Security Issues in Delay Tolerant Networks
Journal of Advances in Shell Programming, 2015
[16] Literature Review on Security Aspects of Delay Tolerant Networks
International Journal of Computer Applications, 2015
[17] 动态网络环境下高延时服务组合的密钥管理
计算机工程与设计, 2014
[18] 基于 DTN 的空间网络互联服务研究综述
计算机研究与发展, 2014
[19] An iTrust Based Misbehaviour Detection Technique on Clustered Nodes in Delay Tolerant Network
International Journal of Recent Development in Engineering and Technology, 2014
[20] A secure message delivery scheme with path tracking for delay tolerant networks
Communications in China (ICCC), 2012 1st IEEE International Conference on. IEEE, 2012
[21] An Energy‐Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks
ICST Transactions on Ubiquitous Environments journal 12, 2012
[22] An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks.
ICST Transactions on Ubiquitous Environments, 2012
[23] A Proactive DOS Filter Mechanism for Delay Tolerant Networks.
PSATS: International Conference on Personal Satellite Services, 2011
[24] A DOS-resilient design for delay tolerant networks
Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International. IEEE, 2011
[25] A proactive DOS filter mechanism for delay tolerant networks
Personal Satellite Services. Springer Berlin Heidelberg, 2011
[26] Message delivery in heterogeneous networks prone to episodic connectivity
Wireless Networks, 2011
[27] DTN 网络安全研究现状与展望
中国科技论文在线, 2010