[1]
|
Thrasyvoulos S, Rao N, Bin R, et al.. Routing for disruption tolerant networks: taxonomy and design[J]. Wireless Network, 2010, 8(16): 2349-2370. |
[2]
|
苏金树, 胡乔林, 赵宝康. 容延容断网络路由技术[J]. 软件学报, 2010, 21(1): 120-124. |
[3]
|
Su Jin-shu, Hu Qiao-lin, and Zhao Bao-kang. Routing techniques on delay/disruption tolerant networks[J]. Journal of Software, 2010, 21(1): 120-124. |
[4]
|
Anand D, Khemchandani V, and Sharma R K. Identity-based cryptography techniques and applications (a review)[C]. Proceedings of the 5th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 343-348. |
[5]
|
Guo L, Zhang C, Yue H, et al.. PSaD: a privacy-preserving social-assisted content dissemination scheme in DTNs[J]. IEEE Transactions on Mobile Computing, 2014, 13(12): 2903-2918. |
[6]
|
Jia Z, Lin X, Tan S H, et al.. Public key distribution scheme for delay tolerant networks based on two-channel cryptography[J]. Network and Computer Applications, 2012, 35(3): 905-913. |
[7]
|
Zhao W, Ammar M, and Zegura E. A message ferrying approach for data delivery in sparse mobile Ad Hoc networks[C]. Proceedings of the 5th International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, 2004: 187-198. |
[8]
|
Xue L, Liu J, and Peng J. An adaptive message ferry routing algorithm for delay tolerant networks[C]. Proceedings of the 14th International Conference on Communication Technology (ICCT), Chengdu, China, 2012: 699-703. |
[9]
|
Wang X, Chen M, Zhang G, et al.. HMFRS: a hierarchical multiple ferries routing scheme for clustered DTNs[C]. Proceedings of the 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, China, 2012: 1-4. |
[10]
|
Wang Y, Peng W, and Dou Q. Energy-constrained ferry route design for sparse wireless sensor networks[J]. Journal of Central South University, 2013, 20(11): 3142-3149. |
[11]
|
Fall K and Farrell S. DTN: an architectural retrospective[J]. IEEE Journal on Selected Areas in Communications, 2008, 26(5): 828-836. |
[12]
|
Pardo J L G. Introduction to Cryptography with Maple[M]. Berlin Heidelberg: Springer, 2013: 131-179, 399-417. |
[13]
|
Sinha R, Srivastava H K, and Gupta S. Performance based comparison study of RSA and elliptic curve cryptography[J]. International Journal of Scientific Engineering Research, 2013, 4(5): 720-725. |
[14]
|
Pan H, Jon C, and Eiko Y. BUBBLE rap: social-based forwarding in delay tolerant networks[J]. IEEE Transactions on Mobile Computing, 2010, 10(11): 1576-1589. |
[15]
|
Ker?nen A, Ott J, and K?rkk?inen T. The ONE simulator for DTN protocol evaluation[C]. Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, 2009: 1-10. |
[16]
|
Zhou H, Chen J, Zhao H, et al.. On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks[J]. IEEE Transactions on Vehicular Technology, 2013, 62(9): 4629-4642. |
[17]
|
Gao H, Hu J, Wilson C, et al.. Detecting and characterizing social spam campaigns[C]. Proceedings of the 10th ACM SIGCOMN Conference on Internet Measurement, New York, USA, 2010: 35-47. |