Abstract. In this paper an alternative method for measuring the Classic Marathon Course using photogrammetric methodology is presented and examined. The course is surveyed in stere...
Ino Papageorgaki, Sevi Tapinaki, Andreas Georgopou...
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Our schools have been experiencing three overlapping waves of technology adoption since the mid-1980s: the personal computer lab wave, the online learning wave, and the digital cl...
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Ubiquitous computing is fostering an explosion of physical artifacts that are coupled to digital information – so-called Spimes. We introduce a tangible workbench that allows fo...
Leonardo Bonanni, Greg Vargas, Neil Chao, Stephen ...