Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
In this paper we present a new approach to monitor noise pollution involving citizens and built upon the notions of participatory sensing and citizen science. We enable citizens t...
Nicolas Maisonneuve, Matthias Stevens, Maria E. Ni...
LA planning in cellular network is useful for minimizing location management cost in GSM network. In fact, size of LA can be optimized to create a balance between the LA update ra...
Nilesh B. Prajapati, Rupal R. Agravat, Mosin I. Ha...
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...