For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
"Open contribution systems" (OCS) are online applications that encourage users to contribute and share content in a "public" and open manner. While these syste...
We present a new framework for information cue rendering on 2D vibrotactile arrays, and we describe an experiment that investigated the feasibility of our approach. The methods ar...
In general, most search engines display a certain number of search results on a search results page at one time, separating the entire search results into multiple search results p...