University of Waterloo / Computer Science University of Waterloo / /
IndustryTerm
End-systems / storage devices / Internet Denial / Internet-accessible gateway / cellular networks / closest Internet gateway / Internet region / bank transaction / delay tolerant network / ubiquitous computing / opportunistic wireless connection / rogue routers / ad-hoc networks / Internet connectivity / storage device / wireless link / secure ubiquitous computing architectures / delay tolerant networks / kiosk operator / adequate practical solution / Internet Environments / mobile local router / authentication challenge response protocol / Location management / public network / offline mobile devices / Internet gateway / mail server / ingress routers / communication protocols / wireless capabilities / Internet kiosk / trusted computing base / client applications / rural and underwater communication networks / challenge-response protocol / simpler algorithm / wireless communication / /
OperatingSystem
DoS / /
Organization
Disconnected Nodes Aaditeshwar Seth Urs Hengartner Srinivasan Keshav School / University of Waterloo / DTN TCB / Link association / Hierarchical Identity Based Encryption Identity Based Cryptography / /
Person
Kevin Fall / Stephen Fung / Craig Gentry / Seth Urs Hengartner Srinivasan / Alice Silverberg / /
Position
DTN custodian / custodian / Personal Digital Assistant / correspondent / forward secrecy / Private / /
Product
Franklin / /
PublishedMedium
Lecture Notes in Computer Science / /
Technology
fixed local DTN router / challenge-response protocol / WEP / Mobile routers / Public Key Infrastructure / mutually reachable DTN routers / DTN router / t-1 / PKI / Personal Digital Assistant / ingress routers / private key / Local DTN router / custodian DTN router / mobile device / WiFibased router / ID-Based Encryption / SSL / DSL / mobile devices / Encryption / Cryptography / mobile DTN router / public key / mobile local router / ingress Local DTN router / control message encryption / cell phones / simpler algorithm / rogue routers / communication protocols / same protocol / Mutual authentication challenge response protocol This protocol / Hierarchical Identity Based Encryption / PDA / DTN routers / /