Search
Now showing items 1-10 of 63
Internet Voting Using Zcash
(2017)
Voting systems have been around for hundreds of years and despite different views on their integrity, have always been deemed secure systems with some fundamental security and anonymity principles. Numerous ...
Style-based distance features for author profiling - Notebook for PAN at CLEF 2013
(2013)
In this paper we present the approach we took in our participation to
the PAN 2013 Author Profiling task. It is an adaptation of our system submitted
for author identification, assuming that a profile category (authors ...
Denoting Offence
(2014)
X509Cloud - Framework for a Ubiquitous PKI
(2017)
The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ...
Below Cross-Layer: An Alternative Approach to Service Discovery for MANETs
(2012)
Service discovery protocols for mobile ad hoc networks at-
tempt to overcome the inability to locate resources presented by networks
in which prior knowledge of node identity and capability is not available.
Existing ...
A Localization Method based on the Helmholtz Reciprocity Theorem
(2014)
A localization method for a non-cooperative transmitter based on the Helmholtz Reciprocity Theorem is presented here. The localization method necessitates a propagation model capable of predicting large-scale fading ...