By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
One fundamental task to realize the envisioned ubiquitous computing paradigm is the proper management of the data generated in this environment. The special characteristics of high...
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...