Applicability of identity-based cryptography for disruption-tolerant networking

N. Asokan*, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

68 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Applicability of identity-based cryptography for disruption-tolerant networking'. Together they form a unique fingerprint.

Computer Science