Sciweavers

7213 search results - page 107 / 1443
» Automated model grouping
Sort
View
ATC
2007
Springer
15 years 10 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
ADHOC
2008
146views more  ADHOC 2008»
15 years 4 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
ISSTA
2006
ACM
15 years 10 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan
ASIACRYPT
2004
Springer
15 years 7 months ago
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
Group signature schemes are cryptographic systems that provide revocable anonymity for signers. We propose a group signature scheme with constant-size public key and signature leng...
Lan Nguyen, Reihaneh Safavi-Naini
HCI
2009
15 years 1 months ago
A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions
During persistent surveillance of a given population in a conflict situation, data management can quickly become unwieldy due to the inundation of low-level information from many, ...
Colleen L. Phillips, Norman D. Geddes, Justin T. S...