Sciweavers

173 search results - page 11 / 35
» Groups with poly-context-free word problem
Sort
View
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 7 months ago
Using groups for investigating rewrite systems
We describe several technical tools that prove to be efficient for investigating the rewrite systems associated with an equational specification. These tools consist in introducing...
Patrick Dehornoy
ADHOC
2008
146views more  ADHOC 2008»
13 years 7 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
JOC
2006
116views more  JOC 2006»
13 years 7 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
COMPSYSTECH
2010
13 years 7 months ago
An experiment with using Google tools for project supervision at tertiary education
: Problem oriented project pedagogy is an alternative educational approach which often provides a strong natural motivation for the students' work. On the other hand, it requi...
Jirí Srba
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...