Web search is often viewed as a solitary task; however, there are many situations in which groups of people gather around a single computer to jointly search for information onlin...
We propose an anonymous video capturing system, called "Stealth Vision", that protects the privacy of objects by fading out their appearance. In order to avoid difficult...
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
This paper studies the use of highly dynamic networks as infrastructures for persistent storage of data that offer services at specific geographical zones in a decentralized and...