R. Ankney, D. Johnson, and M. Matyas, The Unified Model, contribution to X9F1 2. ANSI X9, Agreement, vol.42, 1995.

N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, Towards securing disruption-tolerant networking, 2007.

N. Bhutta, G. Ansa, E. Johnson, N. Ahmad, M. Alsiyabi et al., Security analysis for Delay/Disruption Tolerant satellite and sensor networks, 2009 International Workshop on Satellite and Space Communications, pp.358-359, 2009.
DOI : 10.1109/IWSSC.2009.5286339

S. Blake-wilson and A. Menezes, Authenticated Diffie-Hellman Key Agreement Protocols, SAC 1998, pp.339-361, 1556.
DOI : 10.1007/3-540-48892-8_26

K. Chalkias, S. T. Halkidis, D. Hristu-varsakelis, G. Stephanides, and A. Alexiadis, A Provably Secure One-Pass Two-Party Key Establishment Protocol, 3rd International SKLOIS Conference on Information Security and Cryptology -Inscrypt, pp.108-122, 2007.
DOI : 10.1007/978-3-540-79499-8_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.3227

K. Chalkias, F. Baldimtsi, D. Hristu-varsakelis, and G. Stephanides, Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols, Business and Telecommunication Networks, 2008.
DOI : 10.1007/11774716_19

H. Elkamchouchi and M. Eldefrawy, A New Approach for Key Controlled Agreement, 2007 National Radio Science Conference, pp.1-7, 2007.
DOI : 10.1109/NRSC.2007.371362

H. Elkamchouchi and M. Eldefrawy, An Efficient and Confirmed Protocol for Authentication Key Agreement, 25th National Radio Science Conference-NRSC2008, pp.1-8, 2008.

S. Farrell, DTN Key Management Requirements, work in progress as an internetdraft, 2007.

A. Farrell, S. F. Symington, H. Weiss, and P. Lovell, Delay-Tolerant Networking Security Overview, internet-draft, 2009.

P. Horster, M. Michels, and H. Petersen, Authenticated encryption schemes with low communication costs, Electronics Letters, vol.30, issue.15, pp.1212-1213, 1994.
DOI : 10.1049/el:19940856

Z. Jia, X. Lin, S. Tan, L. Li, and Y. Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Journal of Network and Computer Applications, vol.35, issue.3, 2011.
DOI : 10.1016/j.jnca.2011.03.009

A. Kate, G. Zaverucha, and U. Hengartner, Anonymity and security in delay tolerant networks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.504-513, 2007.
DOI : 10.1109/SECCOM.2007.4550373

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.353

H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol, CRYPTO 2005, pp.546-566, 2005.
DOI : 10.1007/11535218_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3027

K. Lauter and A. Mityagin, Security Analysis of KEA Authenticated Key Exchange Protocol, Lecture Notes in Computer Science, vol.3958, pp.2006-378, 2006.
DOI : 10.1007/11745853_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.2858

L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, An efficient protocol for authenticated key agreement, 1998.

Z. Mohammad, Y. Chen, C. Hsu, and C. Lo, Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols, IETE Technical Review, vol.27, issue.3, pp.27-30, 2010.
DOI : 10.4103/0256-4602.62786

K. Nyberg, On one-pass authenticated key establishment schemes, Workshop on Selected Areas in Cryptography (SAC'95), pp.2-8, 1995.

A. N. Pour, Number Theory and Related Algorithms in Cryptography, Master's thesis, Japan Advanced Institute of Science and Technology, pp.37-43, 2002.

B. Song and K. Kim, Comparison of Existing Key Establishment Protocols, Information Security and Cryptography, pp.1-13, 2000.

W. Van-besien, Dynamic, non-interactive key management for the bundle protocol, Proceedings of the 5th ACM workshop on Challenged networks, CHANTS '10, p.Illinois, 2010.
DOI : 10.1145/1859934.1859951

L. Wood, W. M. Eddy, and P. Holiday, A bundle of problems, 2009 IEEE Aerospace conference, pp.1-14, 2009.
DOI : 10.1109/AERO.2009.4839384