Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network conn...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
This paper deals with a wireless indoor positioning problem in which the location of a tag is estimated from range measurements taken by fixed beacons. The measurements may be affe...