1. Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Towards securing disruption-tolerant networking. Nokia Research Center, Tech. rep. NRC-TR-2007-007 (2007)
2. Belshe, M., Peon, R., Thomson, M.: Hypertext Transfer Protocol Version 2 (HTTP/2). RFC 7540 (May 2015). https://doi.org/10.17487/RFC7540, https://rfc-editor.org/rfc/rfc7540.txt
3. Bhutta, M.N.M., Cruickshank, H., Nadeem, A.: A framework for key management architecture for DTN (KMAD): requirements and design. In: 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1–4. IEEE (2020)
4. Birrane, E.J., McKeever, K.: Bundle Protocol Security Specification. Internet-Draft draft-ietf-dtn-bpsec-27, Internet Engineering Task Force (February 2021). https://datatracker.ietf.org/doc/html/draft-ietf-dtn-bpsec-27, work in Progress
5. Burleigh, S., Fall, K., Birrane, E.J.: Bundle Protocol Version 7. Internet-Draft draft-ietf-dtn-bpbis-31, Internet Engineering Task Force (January 2021). https://datatracker.ietf.org/doc/html/draft-ietf-dtn-bpbis-31, work in Progress