A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
Software systems are becoming more and more complex with a large number of interacting partners often distributed over a network. A common dilemma faced by software engineers in b...
Building realistic end user scenarios for ubiquitous computing applications entails large up-front investments. Many context adaptive applications so far fail to live up to their ...
This paper presents user interface technology, using a glove based menuing system and 3D interaction techniques. It is designed to support applications that allow users to constru...
A contemporary office or knowledge worker has to deal with an ever increasing number of information channels and associated flows of events (i.e., software applications using vary...