Applicability of identity-based cryptography for disruption-tolerant networking, Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking , MobiOpp '07, pp.7-52, 2007. ,
DOI : 10.1145/1247694.1247705
Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.748-760, 2008. ,
DOI : 10.1109/JSAC.2008.080602
Leveraging social contracts for message confidentiality in delay tolerant networks, Proceedings of 33rd IEEE International Computer Software and Applications Conference, pp.271-279, 2009. ,
DOI : 10.1109/compsac.2009.43
A delay-tolerant network architecture for challenged internets, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.27-33, 2003. ,
DOI : 10.1145/863955.863960
DTN: an architectural retrospective, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.828-836, 2005. ,
DOI : 10.1109/JSAC.2008.080609
dRBAC: distributed role-based access control for dynamic coalition environments, Proceedings 22nd International Conference on Distributed Computing Systems, pp.411-420, 2002. ,
DOI : 10.21236/ada440599
Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Journal of Network and Computer Applications, vol.35, issue.3, pp.905-913, 2012. ,
DOI : 10.1016/j.jnca.2011.03.009
Subjective Logic: A Formalism for Reasoning Under Uncertainty, 2016. ,
DOI : 10.1007/978-3-319-42337-1
Trust Transitivity and Conditional Belief Reasoning, Proceedings of the 6th IFIP International Conference on Trust Management IFIP Advances in Information and Communication Technology, p.6883, 2012. ,
DOI : 10.1007/978-3-642-29852-3_5
Exploring Different Types of Trust Propagation, Proceedings of the 4th International Conference on Trust Management (iTrust), p.179192, 2006. ,
DOI : 10.1007/978-1-4615-6245-0
The consensus operator for combining beliefs, Artificial Intelligence, vol.141, issue.1-2, pp.1-2, 2002. ,
DOI : 10.1016/S0004-3702(02)00259-X
A LOGIC FOR UNCERTAIN PROBABILITIES, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.5, issue.03, pp.279-311, 2001. ,
DOI : 10.1080/03081079708945189
An Algebra for Assessing Trust in Certification Chains, Proceedings of the Networks and Distributed Systems Security (NDSS99), 1999. ,
Security and Privacy in Emerging wireless networks, IEEE Wireless Communications, pp.12-21, 2010. ,
Communication challenges in emergency response, Communications of the ACM, vol.50, issue.3, pp.51-53, 2007. ,
DOI : 10.1145/1226736.1226765
A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management, Proceedings of the International Conference on Information Systems for Crisis Response and Management, pp.1-6 ,
Reliable and fully distributed trust model for mobile ad hoc networks, Computers & Security, vol.28, issue.3-4, pp.3-4, 2009. ,
DOI : 10.1016/j.cose.2008.11.009
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp.255-262, 2017. ,
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp.46-53, 2016. ,
DOI : 10.1109/CIC.2016.020
Practical security for disconnected nodes, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)., 2005. ,
DOI : 10.1109/NPSEC.2005.1532050