Login / Signup

Applicability of identity-based cryptography for disruption-tolerant networking.

N. AsokanKari KostiainenPhilip GinzboorgJörg OttCheng Luo
Published in: MobiOpp@MobiSys (2007)
Keyphrases
  • identity based cryptography
  • key management
  • distributed computing
  • bilinear pairings
  • peer to peer
  • database
  • ad hoc networks
  • real time
  • low cost
  • digital signature