Sciweavers

3333 search results - page 104 / 667
» New Invariants for Groups
Sort
View
PKC
2007
Springer
132views Cryptology» more  PKC 2007»
14 years 4 months ago
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Abstract. We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
ICMCS
2005
IEEE
68views Multimedia» more  ICMCS 2005»
14 years 3 months ago
A neural-field-like approach for modeling human group actions in meetings
In this paper we investigate a new architecture for recognizing human group actions in meetings. These group actions provide a basis that enables effective browsing and querying i...
Stephan Reiter, Gerhard Rigoll
NCA
2003
IEEE
14 years 3 months ago
Admission Control in Peer Groups
Security in collaborative peer groups is an active research topic. Most previous work focused on key management without addressing an important pre-requisite: admission control, i...
Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
FC
2008
Springer
94views Cryptology» more  FC 2008»
13 years 11 months ago
Fair Traceable Multi-Group Signatures
This paper presents fair traceable multi-group signatures (FTMGS), which have enhanced capabilities, compared to group and traceable signatures, that are important in real world sc...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
LCN
2006
IEEE
14 years 4 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood