ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
We present a narrative of the design of Contacts 3.0, a service and updated phonebook application on a mobile device that combines on-device communication with communication from ...
Frank R. Bentley, JoEllen Kames, Rafiq Ahmed, Rhia...