z-logo
open-access-imgOpen Access
An Authentication Scheme Using Hierarchical Identity Based Signature in Large-scale Delay Tolerant Networks
Author(s) -
Guo-yu Xu,
Xingyuan Chen,
Xuehui Du
Publication year - 2014
Publication title -
journal of electronics information technology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.191
H-Index - 27
ISSN - 1009-5896
DOI - 10.3724/sp.j.1146.2012.01735
Subject(s) - signature (topology) , scheme (mathematics) , computer science , authentication (law) , identity (music) , scale (ratio) , computer network , distributed computing , computer security , mathematics , geography , physics , mathematical analysis , geometry , cartography , acoustics

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom