The Unified Model, contribution to X9F1 2. ANSI X9, Agreement, vol.42, 1995. ,
Towards securing disruption-tolerant networking, 2007. ,
Security analysis for Delay/Disruption Tolerant satellite and sensor networks, 2009 International Workshop on Satellite and Space Communications, pp.358-359, 2009. ,
DOI : 10.1109/IWSSC.2009.5286339
Authenticated Diffie-Hellman Key Agreement Protocols, SAC 1998, pp.339-361, 1556. ,
DOI : 10.1007/3-540-48892-8_26
A Provably Secure One-Pass Two-Party Key Establishment Protocol, 3rd International SKLOIS Conference on Information Security and Cryptology -Inscrypt, pp.108-122, 2007. ,
DOI : 10.1007/978-3-540-79499-8_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.3227
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols, Business and Telecommunication Networks, 2008. ,
DOI : 10.1007/11774716_19
A New Approach for Key Controlled Agreement, 2007 National Radio Science Conference, pp.1-7, 2007. ,
DOI : 10.1109/NRSC.2007.371362
An Efficient and Confirmed Protocol for Authentication Key Agreement, 25th National Radio Science Conference-NRSC2008, pp.1-8, 2008. ,
DTN Key Management Requirements, work in progress as an internetdraft, 2007. ,
Delay-Tolerant Networking Security Overview, internet-draft, 2009. ,
Authenticated encryption schemes with low communication costs, Electronics Letters, vol.30, issue.15, pp.1212-1213, 1994. ,
DOI : 10.1049/el:19940856
Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Journal of Network and Computer Applications, vol.35, issue.3, 2011. ,
DOI : 10.1016/j.jnca.2011.03.009
Anonymity and security in delay tolerant networks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.504-513, 2007. ,
DOI : 10.1109/SECCOM.2007.4550373
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.353
HMQV: A High-Performance Secure Diffie-Hellman Protocol, CRYPTO 2005, pp.546-566, 2005. ,
DOI : 10.1007/11535218_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3027
Security Analysis of KEA Authenticated Key Exchange Protocol, Lecture Notes in Computer Science, vol.3958, pp.2006-378, 2006. ,
DOI : 10.1007/11745853_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.2858
An efficient protocol for authenticated key agreement, 1998. ,
Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols, IETE Technical Review, vol.27, issue.3, pp.27-30, 2010. ,
DOI : 10.4103/0256-4602.62786
On one-pass authenticated key establishment schemes, Workshop on Selected Areas in Cryptography (SAC'95), pp.2-8, 1995. ,
Number Theory and Related Algorithms in Cryptography, Master's thesis, Japan Advanced Institute of Science and Technology, pp.37-43, 2002. ,
Comparison of Existing Key Establishment Protocols, Information Security and Cryptography, pp.1-13, 2000. ,
Dynamic, non-interactive key management for the bundle protocol, Proceedings of the 5th ACM workshop on Challenged networks, CHANTS '10, p.Illinois, 2010. ,
DOI : 10.1145/1859934.1859951
A bundle of problems, 2009 IEEE Aerospace conference, pp.1-14, 2009. ,
DOI : 10.1109/AERO.2009.4839384