1. Fall K. A delay-tolerant network architecture for challenged internets. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM’03), Aug 25-29, 2003, Karlsruhe, Germany. New York, NY, USA: ACM, 2003: 27-34
2. Xu F L, Liu M, Gong H G, et al. Relative distance-aware data delivery scheme for delay tolerant mobile sensor networks. Journal of Software, 2010, 21(3): 490-504 (in Chinese).
3. Yang K W, Zheng K F, Yang Y X, et al. Motion state-based data delivery scheme of delay tolerant mobile sensor networks. Journal on Communications, 2011, 31(11): 138-146 (in Chinese).
4. Li W J, Zheng K F, Zhang D M, et al. Motive state-based data delivery scheme of delay tolerant mobile sensor network. Journal of Nanjing University of Science and Technology, 2012, 36(9): 150-156 (in Chinese)
5. Sanchez D S, Baldus H. A deterministic pairwise key pre-distribution scheme for mobile sensor networks. Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm’05), Sep 5-9, 2005, Athens Greece. Piscataway, NJ, USA: IEEE, 2005: 277-288
6. Chan H W, Perrig A, Song D. Random key predistribution schemes for sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P’03), May 11-14, 2003, Berkeley, CA, USA. Los Alamitos, CA, USA: IEEE Computer Society, 2003:197-213
7. Samuel H, Zhuang W. Preventing unauthorized messages in DTN based mobile Ad hoc networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’09), Nov 30-Dec 4, 2009, Honolulu, HI, USA. Piscataway, NJ, USA: IEEE, 2009: 6p
8. Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology: Proceedings of the 21st Annual International Cryptology Conference (CRYPTO ’01), Aug 19-23, 2001, Santa Barbara, CA, USA. LNCS 2139. Berlin, Germany: Springer–Verlag, 2001: 213-229
9. Asokan N, Kostiainen K, Ginzboorg P, et al. Applicability of identity-based cryptography for disruption-tolerant networking. Proceedings of the 1st ACM/SIGMOBILE Workshop on Mobile Opportunistic Networking (MobiOpp’07), Jun 11, 2007, San Juan, Puerto Rico. New York, NY, USA: ACM, 2007: 52-56
10. Ming Y, Wang Y M. Improved identity based online/offline signature scheme. Proceedings of the 7th International Conference on Autonomic and Trusted Computing (UIC/ATC’10), Oct 26-29, 2010, Xi’an, China. Piscataway, NJ, USA: IEEE, 2010: 126-131
11. Li F, Zhong D, Takagi T. Practical identity-based signature for wireless sensor networks. Wireless Communications Letters, 2012, 1(6): 637-640
12. Cui S, Duan P, Chan C W. An efficient identity-based signature scheme with batch verifications. Proceeding of the 1st International Conference on Scalable Information Systems (INFOSCALE’06), May 29-Jun 1, 2006, Hong Kong, China. New York, NY, USA: ACM, 2006: 22-28
13. Li R P, Yu J, Li G W, et al. A new identity-based blind signature scheme with batch verifications. Proceeding of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE’07), Apr 26-28, Seoul, Republic of Korea. Piscataway, NJ, USA: IEEE, 2007: 1051-1056
14. Wu T Y, Tsai T T, Tseng Y M. Revocable id-based signature scheme with batch verifications. Proceeding of the 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’12), Jul 18-20, 2012, Piraeus, UK. Piscataway, NJ, USA: IEEE, 2012: 49-54
15. Zhu H J, Lu R X, Shen X M, et al. BBA: an efficient batch bundle authentication scheme for delay tolerant networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’08), Nov 30-Dec 4, 2008, New Orleans, LA, USA. Piscataway, NJ, USA: IEEE, 2008: 5p
16. Zhu H J, Lin R X, Shen X M, et al. An opportunistic batch bundle authentication scheme for energy constrained DTNs. Proceedings of the 29th Annual Joint Conference of the IEEE Computer and Communications (INFOCOM’10), Mar 14-19, 2010, San Diego, CA, USA. Piscataway, NJ, USA: IEEE, 2010: 605-613
17. Tseng Y M, Wu T Y, Wu J D. Toward efficient ID-based signature schemes with batch verifications from bilinear pairings. Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES’09), Mar 16-19, 2009, Fukuoka, Japan. Los Alamitos, CA, USA: IEEE Computer Society, 2009: 935-940
18. Hyytiä E, Lassila P, Nieminen L, et al. Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing, 2006, 5(6): 680-694
19. Barreto P S L M, Libert B, MacCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Advances in Cryptology: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt’05), Dec 4-8, 2005, Chennai (Madras), India. LNCS 3788. Berlin, Germany: Springer-Verlag, 2005: 515-532
20. Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361-396 |