Sciweavers

2188 search results - page 14 / 438
» group 2007
Sort
View
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 7 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
103
Voted
JCT
2007
84views more  JCT 2007»
15 years 3 months ago
Shelling the coset poset
It is shown that the coset lattice of a finite group has shellable order complex if and only if the group is complemented. Furthermore, the coset lattice is shown to have a Cohen...
Russell Woodroofe
164
Voted
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 9 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
154
Voted
ICISC
2003
108views Cryptology» more  ICISC 2003»
15 years 4 months ago
On the Security of a Group Signature Scheme with Forward Security
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable way. In case of a dispute, however, a design...
Guilin Wang
102
Voted
PAIRING
2007
Springer
130views Cryptology» more  PAIRING 2007»
15 years 9 months ago
Bilinear Groups of Composite Order
Dan Boneh