Sciweavers

14 search results - page 3 / 3
» Robust group key agreement using short broadcasts
Sort
View
CSREASAM
2003
13 years 6 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
CLUSTER
1998
IEEE
13 years 4 months ago
Forwarding Group Multicast Protocol (FGMP) for multihop, mobile wireless networks
In this paper we propose a new multicast protocol for multihop mobile wireless networks. Instead of forming multicast trees, a group of nodes in charge of forwarding multicast pac...
Ching-Chuan Chiang, Mario Gerla, Lixia Zhang
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 8 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CIVR
2007
Springer
254views Image Analysis» more  CIVR 2007»
13 years 8 months ago
Soccer players identification based on visual local features
Semantic detection and recognition of objects and events contained in a video stream has to be performed in order to provide content-based annotation and retrieval of videos. This...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...