Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...