Authenticating with privacy protection in opportunistic networks | IEEE Conference Publication | IEEE Xplore