Sciweavers

1058 search results - page 139 / 212
» Secure Group Communications Using Key Graphs
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 4 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
EDCC
2005
Springer
15 years 8 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
AINA
2005
IEEE
15 years 8 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
ICRA
2006
IEEE
94views Robotics» more  ICRA 2006»
15 years 8 months ago
Totally Distributed Motion Control of Sphere World Multi-agent Systems using Decentralized Navigation Functions
— A distributed feedback control architecture that guarantees collision avoidance and destination convergence for multiple sphere world holonomic agents is presented. The well es...
Dimos V. Dimarogonas, Kostas J. Kyriakopoulos, Dim...
COLCOM
2007
IEEE
15 years 8 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...