Login / Signup
Applicability of identity-based cryptography for disruption-tolerant networking.
N. Asokan
Kari Kostiainen
Philip Ginzboorg
Jörg Ott
Cheng Luo
Published in:
MobiOpp@MobiSys (2007)
Keyphrases
</>
identity based cryptography
key management
distributed computing
bilinear pairings
peer to peer
database
ad hoc networks
real time
low cost
digital signature