{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:41:36Z","timestamp":1763106096807,"version":"3.40.5"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_15","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:19Z","timestamp":1747289599000},"page":"219-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["BERMUDA: A BPSec-Compatible Key Management Scheme for\u00a0DTNs"],"prefix":"10.1007","author":[{"given":"Fiona","family":"Fuchs","sequence":"first","affiliation":[]},{"given":"Felix","family":"Walter","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"15_CR1","unstructured":"Abe, R., Nakamura, Y., Takahashi, O.: A DTN routing scheme based on publish\/subscribe model. International Workshop on Informatics (IWIN2013), pp. 23\u201329 (2013)"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1049\/iet-ifs.2015.0438","volume":"11","author":"M Bhutta","year":"2017","unstructured":"Bhutta, M., Cruickshank, H., Sun, Z.: Public-key infrastructure validation and revocation mechanism suitable for delay\/disruption tolerant networks. IET Inf. Secur. 11(1), 16\u201322 (2017). https:\/\/doi.org\/10.1049\/iet-ifs.2015.0438","journal-title":"IET Inf. Secur."},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security analysis for delay\/disruption tolerant satellite and sensor networks. In: 2009 International Workshop on Satellite and Space Communications, pp. 385\u2013389 (2009). https:\/\/doi.org\/10.1109\/IWSSC.2009.5286339","DOI":"10.1109\/IWSSC.2009.5286339"},{"key":"15_CR4","unstructured":"Burleigh, S.C., Horres, D., Viswanathan, K., Benson, M.W., Templin, F.: Architecture for delay-tolerant key administration. Internet-draft, Internet Engineering Task Force (2018). https:\/\/datatracker.ietf.org\/doc\/draft-burleigh-dtnwg-dtka\/02\/"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TIFS.2013.2289993","volume":"9","author":"X Lv","year":"2014","unstructured":"Lv, X., Mu, Y., Li, H.: Non-interactive key establishment for bundle security protocol of space DTNs. IEEE Trans. Inf. Forensics Secur. 9(1), 5\u201313 (2014). https:\/\/doi.org\/10.1109\/TIFS.2013.2289993","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Maaroufi, M., Landais, P., Messiaen, C., Choquet, R.: Federating patients identities: the case of rare diseases. Orphanet J. Rare Dis. 13 (2018). https:\/\/doi.org\/10.1186\/s13023-018-0948-6","DOI":"10.1186\/s13023-018-0948-6"},{"key":"15_CR7","unstructured":"Micali, S.: Novomodo: Scalable certificate validation and simplified PKI management. In: 1st Annual PKI Research Workshop Proceedings, pp. 15\u201325 (2003). https:\/\/www.nist.gov\/publications\/1st-annual-pki-research-workshop-proceedings"},{"key":"15_CR8","unstructured":"Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Project Athena: kerberos authentication and authorization system (1988). https:\/\/web.mit.edu\/saltzer\/www\/publications\/athenaplan\/e.2.1.pdf"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Patra, R., Surana, S., Nedevschi, S.: Hierarchical identity based cryptography for end-to-end security in DTNs. In: 2008 4th International Conference on Intelligent Computer Communication and Processing, pp. 223\u2013230 (2008). https:\/\/doi.org\/10.1109\/ICCP.2008.4648376","DOI":"10.1109\/ICCP.2008.4648376"},{"key":"15_CR10","unstructured":"Sipos, B.: Automated certificate management environment (ACME) delay-tolerant networking (DTN) node ID validation extension. Internet-draft, Internet Engineering Task Force (2024). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-acme-dtnnodeid\/16\/"},{"key":"15_CR11","unstructured":"Templin, F., Burleigh, S.C.: DTN security key management - requirements and design. Internet-draft, Internet Engineering Task Force (2016). https:\/\/datatracker.ietf.org\/doc\/draft-templin-dtn-dtnskmreq\/00\/"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Torgerson, L., et al.: Delay-tolerant networking architecture. RFC 4838 (2007). https:\/\/doi.org\/10.17487\/RFC4838","DOI":"10.17487\/RFC4838"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Van\u00a0Besien, W.L.: Dynamic, non-interactive key management for the bundle protocol. In: Proceedings of the 5th ACM Workshop on Challenged Networks, CHANTS 2010, pp. 75\u201378. Association for Computing Machinery (2010). https:\/\/doi.org\/10.1145\/1859934.1859951","DOI":"10.1145\/1859934.1859951"},{"key":"15_CR14","unstructured":"Viswanathan, K., Templin, F.: Architecture for a delay-and-disruption tolerant public-key distribution network (PKDN). Internet-draft, Internet Engineering Task Force (2016). https:\/\/datatracker.ietf.org\/doc\/draft-viswanathan-dtn-pkdn\/00\/"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:21Z","timestamp":1747289601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}