Sciweavers

2188 search results - page 33 / 438
» group 2007
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IJAC
2007
85views more  IJAC 2007»
14 years 9 months ago
Limit Groups are Conjugacy Separable
A limit group is a finitely generated subgroup of a residually free group. We prove the result announced in the tittle. 2000 Mathematics Subject Classification: 20E06, 20E08, 20...
S. C. Chagas, Pavel Zalesskii
JSS
2007
67views more  JSS 2007»
14 years 9 months ago
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusi...
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lun...
AML
2007
51views more  AML 2007»
14 years 9 months ago
Semifree actions of free groups
We study countable universes similar to a free action of a group G. It turns out that this is equivalent to the study of free semi-actions of G, with two universes being transforma...
Martin Hils
COMCOM
2007
83views more  COMCOM 2007»
14 years 9 months ago
Cost analysis and optimization for IP multicast group management
This paper studies the system parameters that affect the total cost of managing the multicast group on a router. A Petri net model is first proposed to describe the states and t...
Yongjun Li, James Zijun Wang