Login / Signup

Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks.

Michael NoisternigMatthias Hollick
Published in: MSWiM (2014)
Keyphrases
  • efficient solutions
  • bicriteria
  • bi objective
  • optimal solution
  • social networks
  • heuristic methods
  • supply chain
  • genetic algorithm
  • computer networks
  • key distribution