Sciweavers

KES
2006
Springer
13 years 4 months ago
Building common awareness in agent organizations
Groups of collaborative agents within organizations need to achieve goals creating group awareness. This is necessary for groups to act as single entities. The notion of collective...
Ioannis Partsakoulakis, George A. Vouros
JCS
2006
116views more  JCS 2006»
13 years 4 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
JCT
2008
57views more  JCT 2008»
13 years 4 months ago
Invariant boundary distributions for finite graphs
Let be the fundamental group of a finite connected graph G. Let M be an abelian group. A distribution on the boundary of the universal covering tree is an M-valued measure defin...
Guyan Robertson
JCT
2008
71views more  JCT 2008»
13 years 4 months ago
Primitive decompositions of Johnson graphs
A transitive decomposition of a graph is a partition of the edge set together with a group of automorphisms which transitively permutes the parts. In this paper we determine all t...
Alice Devillers, Michael Giudici, Cai Heng Li, Che...
JCIT
2008
130views more  JCIT 2008»
13 years 4 months ago
Group-oriented Encryption Secure against Collude Attack
A group oriented encryption scheme is presented in this paper. In this scheme, a sender is allowed to encrypt a message using the group public key and send the ciphertext to the gr...
Chunbo Ma, Jun Ao
CE
2007
100views more  CE 2007»
13 years 4 months ago
Visualization of participation: Does it contribute to successful computer-supported collaborative learning?
This study investigated the effects of visualization of participation during computer-supported collaborative learning (CSCL). It is hypothesized that visualization of participat...
Jeroen Janssen, Gijsbert Erkens, Gellof Kanselaar,...
CORR
2006
Springer
84views Education» more  CORR 2006»
13 years 4 months ago
A simple generalization of El-Gamal cryptosystem to non-abelian groups
In this paper we propose the group of unitriangular matrices over a finite field as a non-abelian group and composition of inner, diagonal and central automorphisms as a group of a...
Ayan Mahalanobis
CORR
2006
Springer
129views Education» more  CORR 2006»
13 years 4 months ago
The Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent groups
In this paper we study a key exchange protocol similar to the DiffieHellman key exchange protocol, using abelian subgroups of the automorphism group of a non-abelian nilpotent gro...
Ayan Mahalanobis
COMBINATORICS
2006
136views more  COMBINATORICS 2006»
13 years 4 months ago
3-Designs from PGL(2, q)
The group PGL(2, q), q = pn, p an odd prime, is 3-transitive on the projective line and therefore it can be used to construct 3-designs. In this paper, we determine the sizes of o...
Peter J. Cameron, G. R. Omidi, Behruz Tayfeh-Rezai...
CN
2006
62views more  CN 2006»
13 years 4 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda