Sciweavers

980 search results - page 37 / 196
» Analyzing Flickr groups
Sort
View
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
16 years 11 days ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
IPPS
2009
IEEE
15 years 6 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
AVSS
2007
IEEE
15 years 6 months ago
Detecting shopper groups in video sequences
We present a generalized extensible framework for automated recognition of swarming activities in video sequences. The trajectory of each individual is produced by the visual trac...
Alex Leykin, Mihran Tuceryan
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 6 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
GCC
2004
Springer
15 years 5 months ago
Distributed Object Group Framework with Dynamic Reconfigurability of Distributed Services
Abstract. In this paper, we constructed the Distributed Object Group Framework(DOGF) which is a reconfigurable architecture supporting dynamically adaptation of distributed service...
Chang-Sun Shin, Young-Jee Chung, Su-Chong Joo