Sciweavers

1559 search results - page 40 / 312
» Some Group Theory Problems
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CSE
2009
IEEE
15 years 4 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
CCR
2008
88views more  CCR 2008»
14 years 9 months ago
My ten favorite "practical theory" papers
As the saying goes, "In theory there is no difference between theory and practice. But, in practice, there is." Networking research has a wealth of good papers on both s...
Jennifer Rexford
IANDC
2008
150views more  IANDC 2008»
14 years 9 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
ECAL
2005
Springer
15 years 3 months ago
On a Quantitative Measure for Modularity Based on Information Theory
The concept of modularity appears to be crucial for many questions in the field of Artificial Life research. However, there have not been many quantitative measures for modularit...
Daniel Polani, Peter Dauscher, Thomas Uthmann