Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking 2007
DOI: 10.1145/1247694.1247705
|View full text |Cite
|
Sign up to set email alerts
|

Applicability of identity-based cryptography for disruption-tolerant networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
0
4

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 73 publications
(48 citation statements)
references
References 2 publications
1
43
0
4
Order By: Relevance
“…In particular, we focus on a variant of reactive fragmentation where messages are fragmented at senderdefined boundaries. We use the term scrap to refer to the smallest authenticatable unit implied by fragment authentication schemes, e.g., "toilet-paper" [6] or Merkle hash tree [7]. (Those schemes are described towards the end of Section II-C.) With this approach, new partial fragments are only created from complete scraps received.…”
Section: A Fragmentation In Briefmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, we focus on a variant of reactive fragmentation where messages are fragmented at senderdefined boundaries. We use the term scrap to refer to the smallest authenticatable unit implied by fragment authentication schemes, e.g., "toilet-paper" [6] or Merkle hash tree [7]. (Those schemes are described towards the end of Section II-C.) With this approach, new partial fragments are only created from complete scraps received.…”
Section: A Fragmentation In Briefmentioning
confidence: 99%
“…Another approach is using Merkle Hash Trees (MHT) as described in [7]. Messages are proactively divided into fragments and the signed root of the corresponding MHT is attached as the authentication token of the message.…”
Section: Single-ply Toilet Paper Approach With Truncated Hashesmentioning
confidence: 99%
See 1 more Smart Citation
“…Nesses tipos de redes, IBC tem contribuído de forma significativa no diz respeito à confidencialidade, conforme Asokan et al (2007).…”
Section: Redes Tolerantes De Interrupção E Atraso Ou Disruption-and Dunclassified
“…Conforme Asokan et al (2007), a aplicabilidade de IBC na DTN se restringe ao aspecto da confidencialidade quando comparado com a utilização da criptografia convencional. A adoção de IBC na DTN, para assegurar a confidencialidade, é uma solução eficiente em termos de carga no servidor e requisitos de rede para outros recipientes, pois uma infra-estrutura de DTN, por ser uma mais escassa, móvel, sujeita a interferência e extremamente mais barata, comparada a uma infra-estrutura de tempo real, funciona de forma adequada com uma carga menor no servidor, bem como exige menos em termos de requisitos de um servidor.…”
Section: Redes Tolerantes De Interrupção E Atraso Ou Disruption-and Dunclassified