Sciweavers

283 search results - page 23 / 57
» Group Key Management in MANETs
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 9 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
PE
2002
Springer
158views Optimization» more  PE 2002»
14 years 9 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
MKM
2009
Springer
15 years 4 months ago
Finite Groups Representation Theory with Coq
Representation theory is a branch of algebra that allows the study of groups through linear applications, i.e. matrices. Thus problems in abstract groups can be reduced to problems...
Sidi Ould Biha
HICSS
2006
IEEE
155views Biometrics» more  HICSS 2006»
15 years 3 months ago
Contextualizing Knowledge Management Readiness to Support Change Management Strategies
Research on knowledge management (KM) readiness has matured. However, recent organizational structures have emerged which prevent traditional instruments from adequately measuring...
Mark Keith, Michael Goul, Haluk Demirkan, Jason Ni...
JCST
2007
98views more  JCST 2007»
14 years 9 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang