{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:33:49Z","timestamp":1743039229249,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_189","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"1186-1191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks"],"prefix":"10.1007","author":[{"given":"Jinyeong","family":"Kang","sequence":"first","affiliation":[]},{"given":"Inwhee","family":"Joe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"issue":"1","key":"189_CR1","first-page":"331","volume":"5","author":"AG Voyiatzis","year":"2012","unstructured":"Voyiatzis, A.G.: A survey of delay \u2013 disruption tolerant networking applications. J. Internet Eng. 5(1), 331\u2013343 (2012)","journal-title":"J. Internet Eng."},{"key":"189_CR2","unstructured":"Farrell, S., Symington, S., Weiss, H., Lovell, P.: Delay-tolerant networking security overview. In: IETF Internet Draft (2009). draft-irtf-dtnrg-sec-overview-06.txt"},{"key":"189_CR3","doi-asserted-by":"crossref","unstructured":"Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle security protocol specification. In: IETF Internet Draft (2010). draft-irtf-dtnrg-bundle-security-15.txt","DOI":"10.17487\/rfc6257"},{"key":"189_CR4","unstructured":"Farrell, S., Cahill, V.: Security considerations in space and delay tolerant networks. In: Second IEEE International Conference on Space Mission Challenges for Information Technology (2006)"},{"issue":"3","key":"189_CR5","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1016\/j.jnca.2011.03.009","volume":"35","author":"Z Jia","year":"2012","unstructured":"Jia, Z., Lin, X., Tan, S.H., Li, L., Yang, Y.: Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3), 905\u2013913 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"189_CR6","first-page":"1864","volume":"2","author":"JA Basha","year":"2014","unstructured":"Basha, J.A., Mozhi, D.A.: Detection of misbehaviour activities in delay tolerant network using trust authority. IJEDR 2(2), 1864\u20131868 (2014)","journal-title":"IJEDR"},{"key":"189_CR7","doi-asserted-by":"crossref","unstructured":"Johari, R., Gupta, N.: Secure query processing in delay tolerant network using Java cryptography architecture. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653\u2013657. IEEE (2011)","DOI":"10.1109\/CICN.2011.142"},{"key":"189_CR8","doi-asserted-by":"crossref","unstructured":"Kainda, R., Flechais, I., Roscoe, A.: Usability and security of out-of-band channels in secure device pairing protocols. In: 5th Symposium on Usable Privacy, pp. 1\u201312 (2009)","DOI":"10.1145\/1572532.1572547"},{"key":"189_CR9","doi-asserted-by":"crossref","unstructured":"Huang, M., Chen, S., Zhu, Y., Wang, Y.: Cost-efficient topology design problem in time evolving delay-tolerant networks. In: IEEE Global Telecommunication, p. 15 (2010)","DOI":"10.1109\/GLOCOM.2010.5684269"},{"key":"189_CR10","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.: Talking to strangers: authentication in ad-hoc wireless networks. In: 9th Annual NDSS, pp. 7\u201319 (2002)"},{"issue":"2","key":"189_CR11","first-page":"169","volume":"55","author":"A Mashatan","year":"2001","unstructured":"Mashatan, A., Stinson, D.: Practical unconditionally secure two-channel message authentication. Des. Codes Cryptogr. 55(2), 169\u2013188 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"189_CR12","doi-asserted-by":"crossref","unstructured":"Fall, K.: A delay-tolerant network architecture for challenged internets. In: SIGCOMM 2003, Karlsruhe, Germany, 25\u201329 August 2003","DOI":"10.1145\/863955.863960"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T03:27:21Z","timestamp":1570505241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_189","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}