In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
Instant Messaging (IM) is being widely adopted by teenagers. In a study of 16 teenage IM users, we explore IM as an emerging feature of teen life, focusing our questions on its su...
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
The development of information and communication technologies and the expansion of the Internet means that, nowadays, there are huge amounts of information available via these eme...