Sciweavers

3333 search results - page 120 / 667
» New Invariants for Groups
Sort
View
ICICS
2001
Springer
14 years 2 months ago
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
COMPSAC
2004
IEEE
14 years 1 months ago
Cooperative and Group Testing in Verification of Dynamic Composite Web Services
Verifying Web Services (WS) in a dynamic Service Oriented Architecture (SOA) is challenging because new services can be composed at runtime using existing WS. Furthermore, in a co...
Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Ning L...
EUROCRYPT
2008
Springer
13 years 12 months ago
Threshold RSA for Dynamic and Ad-Hoc Groups
Abstract--We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs ("mobile ad-hoc networks"). We first show that known threshold RSA signat...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...
DM
2010
108views more  DM 2010»
13 years 10 months ago
Locally toroidal polytopes and modular linear groups
When the standard representation of a crystallographic Coxeter group G (with string diagram) is reduced modulo the integer d 2, one obtains a finite group Gd often the automorphi...
Barry Monson, Egon Schulte
IJISEC
2007
88views more  IJISEC 2007»
13 years 10 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...