{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:02:17Z","timestamp":1746417737946,"version":"3.40.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083674"},{"type":"electronic","value":"9783319083681"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08368-1_7","type":"book-chapter","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T21:09:44Z","timestamp":1407964184000},"page":"59-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Securing Communications in Infrastructure-Poor Areas"],"prefix":"10.1007","author":[{"given":"Daouda","family":"Ahmat","sequence":"first","affiliation":[]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Magoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,14]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ahmat, D., Magoni, D.: Muses: Mobile user secured session. In: Wireless Days (WD), 2012 IFIP, pp. 1\u20136 (2012)","DOI":"10.1109\/WD.2012.6402807"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.comnet.2011.09.015","volume":"56","author":"A Avramidis","year":"2012","unstructured":"Avramidis, A., Kotzanikolaou, P., Douligeris, C., Burmester, M.: Chord-pki: a distributed trust infrastructure based on p2p networks. Comput. Netw. 56(1), 378\u2013398 (2012)","journal-title":"Comput. Netw."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Cassagnes, C., Tiendrebeogo, T., Bromberg, D., Magoni, D.: Overlay addressing and routing system based on hyperbolic geometry. In: ISCC\u201911 - IEEE International Symposium on Computers and Communications, pp. 294\u2013301, 28 June\u20131 July 2011","DOI":"10.1109\/ISCC.2011.5983793"},{"key":"7_CR4","unstructured":"Demmer, M.J.: A Delay Tolerant Networking and System Architecture for Developing Regions. Ph.D. thesis, University of California, Berkeley (2008)"},{"issue":"6","key":"7_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"7_CR6","first-page":"15","volume":"115","author":"DBA Epstein","year":"1966","unstructured":"Epstein, D.B.A.: Curves on 2-manifolds and isotopies. Acta Math. 115(1), 15\u201316 (1966)","journal-title":"Acta Math."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups (2000)","DOI":"10.1145\/352600.352638"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kwon, H., Koh, S., Nah, J., Jang, J.: The secure routing mechanism for dht-based overlay network. In: 10th International Conference on Advanced Communication Technology, ICACT 2008, vol. 2, pp. 1300\u20131303 (2008)","DOI":"10.1109\/ICACT.2008.4494002"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/TNET.2006.872575","volume":"14","author":"PPC Lee","year":"2006","unstructured":"Lee, P.P.C., Lui, J.C.S., Member, S., Yau, D.K.Y.: Distributed collaborative key agreement and authentication protocols for dynamic peer groups. IEEE\/ACM Trans. Networking 14, 263\u2013276 (2006)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Lilien, L., Kamal, Z., Gupta, A.: Opportunistic networks: challenges in specializing the p2p paradigm. In: 17th International Workshop on Database and Expert Systems Applications, DEXA \u201906, pp. 722\u2013726 (2006)","DOI":"10.1109\/DEXA.2006.107"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Hui, P.: The quest for a killer app for opportunistic and delay tolerant networks (invited paper). In: CHANTS, pp. 59\u201366 (2009)","DOI":"10.1145\/1614222.1614233"},{"key":"7_CR12","unstructured":"Manku, G.S., Bawa, M., Raghavan, P.: Symphony: Distributed hashing in a small world. In: Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, pp. 127\u2013140 (2003)"},{"key":"7_CR13","unstructured":"Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: a scalable Peer-to-Peer lookup service for internet applications. In: ACM SIGCOMM 2001, San Diego, CA, September 2001"},{"key":"7_CR14","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-41178-6_17","volume-title":"e-Infrastructure and e-Services for Developing Countries","author":"J Ouoba","year":"2013","unstructured":"Ouoba, J., Bissyand\u00e9, T.F.: Leveraging the cultural model for opportunistic networking in Sub-Saharan Africa. In: Jonas, K., Rai, I.A., Tchuente, M. (eds.) AFRICOMM 2012. LNICST, vol. 119, pp. 163\u2013173. Springer, Heidelberg (2013)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Reich, J., Chaintreau, A.: The age of impatience: optimal replication schemes for opportunistic networks. In: CoNEXT, pp. 85\u201396 (2009)","DOI":"10.1145\/1658939.1658950"},{"issue":"17","key":"7_CR16","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1016\/j.comnet.2006.02.001","volume":"50","author":"J Risson","year":"2006","unstructured":"Risson, J., Moors, T.: Survey of research towards robust peer-to-peer networks: search methods. Comput. Netw. 50(17), 3485\u20133521 (2006)","journal-title":"Comput. Netw."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Saif, U., Chudhary, A.L., Butt, S., Butt, N.S., Murtaza, G.: Internet for the developing world: offline internet access at modem-speed dialup connections. In: International Conference on Information and Communication Technologies and Development, ICTD 2007, pp. 1\u201313 (2007)","DOI":"10.1109\/ICTD.2007.4937394"},{"issue":"1","key":"7_CR18","first-page":"31","volume":"5","author":"U Saif","year":"2009","unstructured":"Saif, U., Chudhary, A.L., Butt, S., Butt, N.F., Murtaza, G.: A peer-to-peer internet for the developing world. Inf. Technol. Int. Dev. 5(1), 31\u201347 (2009)","journal-title":"Inf. Technol. Int. Dev."},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1290168.1290170","volume":"37","author":"U Saif","year":"2007","unstructured":"Saif, U., Chudhary, A.L., Butt, S., Butt, N.F., Rodriguez, P., Saif, U., Chudhary, A.L.: Poor man\u2019s broadband: peer-to-peer dialup networking. ACM SIGCOMM Comput. Comm. Rev. 37, 5\u201316 (2007)","journal-title":"ACM SIGCOMM Comput. Comm. Rev."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: 20th Annual Computer Security Applications Conference, pp. 252\u2013261 (2004)","DOI":"10.1109\/CSAC.2004.50"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-hellman key distribution extended to group communication. pp. 31\u201337. ACM Press (1996)","DOI":"10.1145\/238168.238182"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Takano, Y., Isozaki, N., Shinoda, Y.: Multipath key exchange on p2p networks. In: The First International Conference on Availability, Reliability and Security, ARES 2006, p. 8 (2006)","DOI":"10.1109\/ARES.2006.87"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Tiendrebeogo, T., Ahmat, D., Magoni, D.: Reliable and scalable distributed hash tables harnessing hyperbolic coordinates. In: 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20136 (2012)","DOI":"10.1109\/NTMS.2012.6208677"},{"issue":"2","key":"7_CR24","doi-asserted-by":"publisher","first-page":"8:1","DOI":"10.1145\/1883612.1883615","volume":"43","author":"V Urdaneta","year":"2011","unstructured":"Urdaneta, V., Pierre, G., Steen, M.V.: A survey of dht security techniques. ACM Comput. Surv. 43(2), 8:1\u20138:49 (2011)","journal-title":"ACM Comput. Surv."},{"key":"7_CR25","unstructured":"Wang, P., Osipkov, I., Kim, Y.: Myrmic: Secure and robust dht routing. Technical report (2007)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Wen, V., Shao-Zhang, N., Jian-Cheng, Z.: A key management mechanism for dht networks. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 339\u2013342 (2012)","DOI":"10.1109\/IIH-MSP.2012.88"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08368-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:22:37Z","timestamp":1746336157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08368-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083674","9783319083681"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08368-1_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"14 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}