We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Email thread reassembly is the task of linking messages by parentchild relationships. In this paper, we present two approaches to address this problem. One exploits previously und...
With the ubiquity of typed text, the style and much of the personality of handwriting has been lost from general communication. To counter this we introduce an artistic real-time ...
Petra Neumann, Annie Tat, Torre Zuk, M. Sheelagh T...
We present work that explores whether the asynchronous peer-topeer communication capabilities of email can be made accessible to illiterate populations in the developing world. Bu...
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...