In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
: Stored map services in mobile devices, such as cellular phones, are being commercialised for the mobile and wireless environment. In order to ensure the quality and accuracy of t...
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
Our work aims to address the problems of designing health assistant applications that run on mobile devices. We discuss the lessons learnt through the design of a mobile applicati...