View invariance for human action recognition

V Parameswaran, R Chellappa - International Journal of Computer Vision, 2006 - Springer
This paper presents an approach for viewpoint invariant human action recognition, an area
that has received scant attention so far, relative to the overall body of work in human action …

LiSP: A lightweight security protocol for wireless sensor networks

T Park, KG Shin - ACM Transactions on Embedded Computing Systems …, 2004 - dl.acm.org
Small low-cost sensor devices with limited resources are being used widely to build a self-
organizing wireless network for various applications, such as situation monitoring and asset …

GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks

S Zhu, S Setia, S Xu, S Jajodia - Journal of Computer Security, 2006 - content.iospress.com
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast
in ad hoc networks. Our protocol exploits the property of ad hoc networks that each member …

Protocol design for scalable and reliable group rekeying

XB Zhang, SS Lam, DY Lee… - IEEE/ACM Transactions …, 2003 - ieeexplore.ieee.org
We present the design and specification of a protocol for scalable and reliable group
rekeying together with performance evaluation results. The protocol is based upon the use …

A survey of group key management

B Jiang, X Hu - … conference on computer science and software …, 2008 - ieeexplore.ieee.org
Group-oriented applications are urgent in network communications for bandwidth
economizations. The security issues in multicast are also urgent to be addressed. And the …

Performance optimizations for group key management schemes

S Zhu, S Setia, S Jajodia - 23rd International Conference on …, 2003 - ieeexplore.ieee.org
Recently, many group key management approaches based on the use of logical key trees
have been proposed to address the issue of scalable group rekeying that is needed to …

Contribution à l'algorithmique en algèbre différentielle

F Lemaire - 2002 - theses.hal.science
Cette thèse est consacrée à l'étude des systèmes d'équations différentielles non linéaires
aux dérivées partielles. L'approche choisie est celle de l'algèbre différentielle. Étant donné …

Scalable group key management for secure multicast: A taxonomy and new directions

S Zhu, S Jajodia - Network security, 2010 - Springer
Many multicast-based applications (eg, pay-per-view, online auction, and teleconferencing)
require a secure communication model to prevent disclosure of distributed data to …

A reliable key authentication schema for secure multicast communications

R Di Pietro, A Durante… - … Symposium on Reliable …, 2003 - ieeexplore.ieee.org
The paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on
the reliability of the re-keying authentication process. We show that the key management in …

Key-update distribution in secure group communication

SS Kulkarni, B Bruhadeshwar - Computer Communications, 2010 - Elsevier
We focus on the problem of distributing key updates in secure dynamic group
communication. In secure groups, to reflect changing group membership, the group …