Christopher S. Eagle

Learn More
We consider the mean and variance of the number of en-cryptions necessary over all subsets of privileged users to revoke a set of users in the complete subtree scheme (CST) and the subset-difference scheme (SD). These are well-known tree based broadcast encryption schemes. give the mean number of encryptions for these schemes. We continue their analysis and(More)
We study the number of encryptions necessary to revoke a set of users in the complete subtree scheme (CST) and the subset-difference scheme (SD). These are well-known tree based broadcast encryption schemes. give the mean number of encryptions for these schemes. We continue their analysis and show that the limiting distribution of the number of encryptions(More)
This paper describes the distance learning Software Engineering Master's program offered at the Naval Postgraduate School and presents the lessons from its first class. The program differs from the other software engineering programs in two ways: (1) the curriculum is developed specifically to meet the needs for formal software engineering education for DoD(More)
  • 1