Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
In designing for engagement at a public multi-touch installation, we identified supporting multiple users and allowing for gradual discovery as challenges. In this paper, we prese...
Giulio Jacucci, Ann Morrison, Gabriela T. Richard,...
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
We describe a new application of interactive participatory performance in interaction design. Our pragmatic strategy permits us to use performance as an investigatory tool in the ...
Robyn Taylor, Pierre Boulanger, Patrick Olivier, J...