Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
Because of their severe resource-restrictions and limited user interfaces, smart everyday objects must often rely on remote resources to realize their services. This paper shows ho...
An ongoing research topic is to build suitable visualization architectures for anthropomorphic conversational user interfaces which will run on different devices like laptops, PDA...
Today's user is surrounded by mobile appliances that continuously disrupt his activities through instant message, email and phone call notifications. In this paper, we presen...
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...