Authenticated resource management in delay-tolerant networks using proxy signatures | IEEE Conference Publication | IEEE Xplore