The context concept can be used with advantage in the area of Computer-Supported Cooperative Work. In many studies, several forms of context have been used without explicit associ...
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...
1 We present a solution to the conjugacy decision problem and the conjugacy search problem2 in Garside groups, which is theoretically simpler than the usual one, with no loss of eï...
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Pervasive computing envisions implicit interaction between people and their intelligent environments instead of individual devices, inevitably leading to groups of individuals inte...
Dawud Gordon, Jan-Hendrik Hanne, Martin Berchtold,...