Sciweavers

15 search results - page 2 / 3
» Nonstandard Meromorphic Groups
Sort
View
IANDC
2008
84views more  IANDC 2008»
13 years 4 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
INFOCOM
2003
IEEE
13 years 10 months ago
A Multicast Transmission Schedule for Scalable Multi-Rate Distribution of Bulk Data Using Non-Scalable Erasure-Correcting Codes
–This paper addresses the efficient multicast dissemination of bulk data from a single server to numerous clients. The challenge is complex: a client may commence reception at ar...
Yitzhak Birk, Diego Crupnicoff
IPCO
2001
117views Optimization» more  IPCO 2001»
13 years 6 months ago
Pruning by Isomorphism in Branch-and-Cut
The paper presents a branch-and-cut for solving (0, 1) integer linear programs having a large symmetry group. The group is used for pruning the enumeration tree and for generating ...
François Margot
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 3 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
CSE
2009
IEEE
13 years 9 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph