{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:17:50Z","timestamp":1725571070891},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136177"},{"type":"electronic","value":"9783642136184"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13618-4_19","type":"book-chapter","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T02:08:41Z","timestamp":1291774121000},"page":"265-275","source":"Crossref","is-referenced-by-count":3,"title":["ID Based Cryptography and Anonymity in Delay\/Disruption Tolerant Networks"],"prefix":"10.1007","author":[{"given":"Naveed","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Haitham","family":"Cruickshank","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Cerf, V., et al.: Delay Tolerant Networking Architecture. IETF, Network Working Group, RFC 4838 (2007)","DOI":"10.17487\/rfc4838"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Fall, K.: A Delay Tolerant Network for Challenging Internet. In: SIGCOMM 2003 Conference on Application, Technologies, Architecture and Protocol for Computer communication, pp. 27\u201334 (2003)","DOI":"10.1145\/863956.863960"},{"key":"19_CR3","unstructured":"Warthman, F.: A Tutorial Delay Tolerant Networks (DTNs). V 1.1, DTNRG (2003)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF, Network Working Group, RFC 5050 (2007)","DOI":"10.17487\/rfc5050"},{"key":"19_CR5","unstructured":"Farrell, S., Cahill, V.: Security consideration in space and delay tolerant networks. In: Second IEEE international conference, Space mission challenges for information technology, SMC-IT (2006)"},{"key":"19_CR6","unstructured":"Fall, K., Chakrabarthi, A.: Identity Based Cryptography for Delay Tolerant Networking (2003), http:\/\/edify.cse.lehigh.edu\/EdifyTeam\/edifyTeamDocs\/dtn_sec.pdf"},{"key":"19_CR7","unstructured":"Symington, S.F., et al.: Bundle Security Protocol Specification. draft-irtf-dtnrg-bundle-security-08, IETF draft (2008)"},{"key":"19_CR8","unstructured":"Farrell, S., et al.: Delay-Tolerant Networking Security Overview. draft-irtf-dtnrg-sec-overview-06, IETF draft (2009)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay\/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)","DOI":"10.1109\/IWSSC.2009.5286339"},{"key":"19_CR10","unstructured":"Farrell, S., Cahill, V.: Delay and Disruption Tolerant Network (2006), ISBN. 1-59693-063-2"},{"key":"19_CR11","unstructured":"Weise, J.: Public Key Infrastructure Overview. Sun Blue Prints (2001)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Asokan, N., et al.: Applicability of Identity Based Cryptography in Disruption Tolerant Network. In: 1st international MobiSys workshop on mobile oppurtunistics networking, MobiOpp 2007, pp. 52\u201356 (2007)","DOI":"10.1145\/1247694.1247705"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"19_CR14","unstructured":"Gagne, M.: Identity based encryption: A survey. RSA Labortries, Cryptobytes\u00a06 (2003)"},{"key":"19_CR15","unstructured":"Baek, J., et al.: A survey of Identity based cryptography. In: Proc. of Australian Unix Users Group Annual Conference (2004)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-540-74143-5_4","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 213\u2013229. Springer, Heidelberg (2007)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Seth, A., Keshav, S.: Particle security for disconnected nodes. In: First workshop on Secure Network Protocols (NPSec), pp. 31\u201336 (2005)","DOI":"10.1109\/NPSEC.2005.1532050"},{"key":"19_CR18","unstructured":"Farrell, S., Symington, S., Weiss, H.: Delay Tolerant Network Security overview. Draft-irtf-dtnrg-sec-overview-08, IRTF (2008)"},{"key":"19_CR19","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity and identity management- A consolidated proposal for terminology (2008), http:\/\/dud.inf.tudresden.de\/AnonTerminology.shtml"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic email, return address and digital pseudonym. Communication of the ACM (1981)","DOI":"10.1145\/358549.358563"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Reed, M.G., et al.: Anonymous connection and onion routing. IEEE journal on selected areas in communication, 482\u2013494 (1998)","DOI":"10.1109\/49.668972"},{"key":"19_CR22","unstructured":"Danezis, G., Diaz, C.: A survey of anonymous communication channels. Journal of Privacy technology (2008)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Kate, A., et al.: Anonymity and security in delay tolerant networks. In: third international conference on security and privacy, SecureComm 2007 (2007)","DOI":"10.1109\/SECCOM.2007.4550373"},{"key":"19_CR24","unstructured":"Lynn, B.: Paring Based Cryptography (PBC) library, http:\/\/crypto.stanford.edu\/pbc\/"},{"key":"19_CR25","unstructured":"DTN Research group, http:\/\/www.dtnrg.org\/wiki\/Code"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Personal Satellite Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13618-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T18:24:49Z","timestamp":1559845489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13618-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136177","9783642136184"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13618-4_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}