Seguridad Ni Juan

Friday, May 17, 2019

Achieving end-to-end auditability and verifiability in Philippine automated elections

›
The design of the transparency server which is under COMELEC control as an interface that provides media outlets and election watchdogs cop...
Sunday, May 26, 2013

Thoughts about Vote Buying in the Philippines

›
Vote-buying in the Philippines can be understood as an instance of the classical prisoner's dilemma problem.On the assumption that a cer...

Thoughts On Election Verifiability and the use of E-voting Systems in Philippine Election

›
I believe that precinct level manual counting provides very nice security properties that are important in ensuring election results integri...
Tuesday, July 19, 2011

on IP: IPv4 and IPv6

›
IP is the main protocol at the network layer of the Internet. Essentially, every data sent by any top level layer i.e. transport and applica...
Tuesday, July 5, 2011

on "Congestion Avoidance and Control [2]"

›
The paper describes a congestion avoidance/control algorithm which has following features: 1. a connection re/starts slow, packet transmissi...

on the "Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks[1]"

›
The paper presented a mathematical analysis of increase/decrease algorithms for congestion avoidance in computer networks. Congestion avoida...
Tuesday, June 28, 2011

on the 'Rethinking the design of the Internet: 2 The end to end arguments vs. the brave new world'

›
The author of the paper reiterates the design principles that have been guiding the development of the Internet up to the present, called en...
›
Home
View web version

About Me

john ultra
Hi Am John.
View my complete profile
Powered by Blogger.