Sciweavers

1931 search results - page 57 / 387
» Managing coherent groups
Sort
View
ACSAC
2001
IEEE
14 years 11 days ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler
ASIACRYPT
2003
Springer
14 years 11 days ago
Efficient Group Signatures without Trapdoors
Abstract. Group signature schemes are fundamental cryptographic tools that enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis...
Giuseppe Ateniese, Breno de Medeiros
JAR
2006
107views more  JAR 2006»
13 years 8 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
FOCS
1992
IEEE
14 years 24 days ago
Computing in Solvable Matrix Groups
We announce methods for e cient management of solvable matrix groups over nite elds. We show that solvability and nilpotence can be tested in polynomial-time. Such e ciency seems ...
Eugene M. Luks
ICIP
2010
IEEE
13 years 6 months ago
Collaborative particle filters for group tracking
Tracking groups of people is a highly informative task in surveillance, and it represents a still open and little explored issue. In this paper, we propose a brand new framework f...
Loris Bazzani, Marco Cristani, Vittorio Murino