[1] Erman Ayday, and Faramarz Fekri “An Iterative Algorithm for Trust Management and Adversary Detection For Delay-Tolerant Networks” IEEE trans. on mobile computing, VOL. 11, NO. 3, SEP 2012.
[2] Z. Zhang, “Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges,” IEEE Communications Tutorials & Surveys, vol. 8, no. 1, quarter 2006, pp. 24–37.
[3] K. Fall, “A Delay-Tolerant Network Architecture for challenged internets,” in Proceedings of the 2003 conference on protocols, architectures, technologies and application for computer communications. ACM, 2003, pp. 27–34.
[4] Z. Zhang and Q. Zhang, “Delay/disruption tolerant mobile ad hoc networks: latest developments: Research articles,” Wireless Communication Mobile Computer, vol. 7, no. 10, Dec. 2007, pp. 1219–1232.
[5] J. Crowcroft, E. Yoneki, P. Hui, and T. Henderson, “Promoting tolerance for delay tolerant network research,” SIGCOMM Computer Communi. Rev., vol. 38, no. 5, Sept. 2008, pp. 63–68.
[6] A. Lindgren and P. Hui, “The quest for a killer app for opportunistic and delay tolerant networks,” in Proceedings of the ACM workshop on Challenged networks (CHANTS ’09). New York, USA: ACM, 2009, pp. 59–66.
[7] W. D. Ivancic, “Security analysis of DTN architecture and bundle protocol specification for space-based networks,” in 2010 IEEE Aerospace Conference, NJ, USA: IEEE, 2010, pp. 1–12.
[8] S. Domancich, “Security in delay tolerant networks for the Android platform,” Master’s thesis, Royal Institute of Technology (KTH), Sweden, June 2010.
[9] M. Loubser, “Delay tolerant networking for sensor networks,” Swedish Institute of Computer Science, Kista, Sweden, Tech. Rep. T2006:01, 2006.
[10] M. Liu, Y. Yang, and Z, “A survey of routing protocols and simulations in delay-tolerant networks,” in Proceedings of the international conference on Wireless algorithms, applications, and systems. Berlin, Heidelberg on IEEE, 2011, pp. 243–253.
[11] J. Morgenroth, T. Poegel, “Delay-tolerant networking in restricted networks,” in Proceedings of the 6th ACM seminar on Challenged networks. New York, NY, USA: ACM, 2011, pp. 53–56.