In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Driven by the market demand for high-definition 3D graphics, commodity graphics processing units (GPUs) have evolved into highly parallel, multi-threaded, many-core processors, whi...
There are academic and commercial drivers for contextawareness to play a prominent role in the future of mobile services. Implementing a complete model of context remains an unsol...
In this paper we describe a field trial designed to investigate the potential of remote, situated messaging within the home. Five households used our “HomeNote” device for app...
Abigail Sellen, Richard H. R. Harper, Rachel Eardl...