[1]
|
K. Fall, “A Delay Tolerant Networking Architecture for Challenged Internet,” In: Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM’ 03, Karlsruhe, 2003, pp. 27-34.
|
[2]
|
A. Kate, G. Zaverucha and U. Hengartner, “Anonymity and Security in Delay Tolerant Networks,” The 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Secure Communication, September 2007, pp. 504-513.
|
[3]
|
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho and X. Shen, “Security in Vehicular Ad Hoc Networks,” IEEE Communications Magazine, 2008, Vol. 46, No. 4, pp. 88-95.
|
[4]
|
R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen, “ECPP: efficient conditional privacy preservation protocol for secure vehicular communications,” The 27th IEEE International Conference on Computer Communications, INFOCOM 2008, Phoenix, 15-17 April 2008.
|
[5]
|
J. Cui, J. Kong, M. Gerla and S. Zhou, “The Challenges of Building Mobile Underwater Wireless Networks for Aquatic Applications,” IEEE Network, Vol. 20, No. 3, 2006, pp. 12-18.
|
[6]
|
Delay Tolerant Networking Research group, November 2008. http://www.dtnrg.org.
|
[7]
|
V. Cerf, et al., “Delay-Tolerant Network Architecture, IETF RFC 4838, Informational,” April 2007. http://www. ietf.org/rfc/rfc4838.txt.
|
[8]
|
K. Scott and S. Burleigh, “Bundle Protocol Specification, IETF RFC 5050, Experimental,” November 2007. http:// www.ietf.org/rfc/rfc5050.txt.
|
[9]
|
A. McMahon and S. Farrell, “Delay- and Disruption- Tolerant Networking,” IEEE Internet Computing, Vol. 13, No. 6, 2009, pp. 82-87.
|
[10]
|
F. Warthman, “Delay-Tolerant Networks (DTNs) A Tutorial.” http://www.dtnrg.org/March 2003.
|