Sciweavers

1931 search results - page 46 / 387
» Managing coherent groups
Sort
View
CSCWD
2001
Springer
14 years 1 months ago
Supporting Group Awareness in Collaborative Design
Different from multi-user database management systems, CSCW system must support group awareness explicitly, namely that participants should perceive the presence of each other dur...
Yan Liu, Yuanchun Shi, Guangyou Xu
INFOCOM
1999
IEEE
14 years 1 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
DISCEX
2003
IEEE
14 years 2 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker
AINA
2005
IEEE
14 years 2 months ago
Grouping Proof for RFID Tags
An RFID tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The tag is used for management of goods and its distribution. Moreove...
Junichiro Saito, Kouichi Sakurai
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
14 years 1 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...