Sciweavers

211 search results - page 9 / 43
» Secrecy and Group Creation
Sort
View
UM
2009
Springer
14 years 3 months ago
Narcissus: Group and Individual Models to Support Small Group Work
Long term group work by small teams is a central part of many learning and workplace activities. Widespread group support tools such as wikis, version control systems and issue tra...
Kimberley Upton, Judy Kay
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 6 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
IACR
2011
223views more  IACR 2011»
12 years 8 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
NIME
2004
Springer
106views Music» more  NIME 2004»
14 years 1 months ago
LEMUR's Musical Robots
This paper describes new work and creations of LEMUR, a group of artists and technologists creating robotic musical instruments. Keywords Robotics, music, instruments, MIDI
Eric Singer, Jeff Feddersen, Chad Redmon, Bil Bowe...
SAC
2010
ACM
14 years 1 months ago
Secret interest groups (SIGs) in social networks with an implementation on Facebook
In this paper we present the first framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks; SIGs are self managed groups formed outside of t...
Alessandro Sorniotti, Refik Molva