Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
- Smart care technology is any sensor based technology used to aid and support human independent living. Such technologies offer new potential and can give rise to new problems for...
We present the design of Plurality,1 an interactive tagging system. Plurality's modular architecture allows users to automatically generate high-quality tags over Web content...