• Using Language Models for Classifying the Party Affiliation of Political Texts 

      Doan, Tu My; Kille, Benjamin Uwe; Gulla, Jon Atle (Journal article, 2022)
    • Utilizing Connectivity Maps to Accelerate V2I Communication in Cellular Network Dead Spots 

      Meyer, Jon Arild Ekberg; Puka, Ergys; Herrmann, Peter (Peer reviewed; Journal article, 2020)
      On many roads in rural and mountainous areas, the cellular network connectivity is intermittent and dead spots, i.e., zones without any coverage, are frequent. In previous work, we developed a data dissemination protocol ...
    • A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing 

      Boyen, Xavier; Haines, Thomas Edmund; Müller, Johannes (Peer reviewed; Journal article, 2020)
      Mix nets are often used to provide privacy in modern security protocols, through shuffling. Some of the most important applications, such as secure electronic voting, require mix nets that are verifiable. In the literature, ...
    • Verifiable Decryption for BGV 

      Silde, Tjerand (Peer reviewed; Journal article, 2022)
      In this work we present a direct construction for verifiable decryption for the BGV encryption scheme by combining existing zero-knowledge proofs for linear relations and bounded values. This is one of the first constructions ...
    • Verifiable Decryption in the Head 

      Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand (Peer reviewed; Journal article, 2022)
      In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple ...
    • Verifiable Homomorphic Tallying for the Schulze Vote Counting Scheme 

      Haines, Thomas Edmund; Pattinson, Dirk; Tiwari, Mukesh (Peer reviewed; Journal article, 2019)
      The encryption of ballots is crucial to maintaining integrity and anonymity in electronic voting schemes. It enables, amongst other things, each voter to verify that their encrypted ballot has been recorded as cast, by ...
    • Viewing Rate-Based Neurons as Biophysical Conductance Outputting Models 

      Knudsen, Martinius; Hendseth, Sverre; Tufte, Gunnar; Sandvig, Axel (Journal article; Peer reviewed, 2019)
      In the field of computational neuroscience, spiking neural network models are generally preferred over rate-based models due to their ability to model biological dynamics. Within AI, rate-based artificial neural networks ...
    • Vote Selling Resistant Voting 

      Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter (Peer reviewed; Journal article, 2020)
      Creating a secure (purely) remote voting scheme which prevents active vote selling is an open problem. Observing that vote selling has a primarily economic motivation, we propose a novel approach to the problem which ...
    • Web Accessibility in Higher Education in Norway: To What Extent are University Websites Accessible? 

      Inal, Yavuz; Torkildsby, Anne Britt (Journal article; Peer reviewed, 2023)
      University websites should be accessible and easy to navigate for all users, regardless of their ability or disability. However, many university websites still have inaccessible features, even in countries where web ...
    • What Affects the Success of Programmers in Query Validation Process? An Eye Tracking Study 

      Mishra, Deepti; Inal, Yavuz (Journal article; Peer reviewed, 2023)
      A meticulous examination of SQL queries plays a pivotal role in the process of learning SQL. It is important to understand the procedures utilized by students in SQL query formulation, but there has been insufficient ...