Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Human interaction with wearable computers is an important research issue, especially when combined with mixed reality (MR) applications. Natural and non-obtrusive means of interac...
Adrian David Cheok, Krishnamoorthy Ganesh Kumar, S...
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
This paper examines the parallels in the development of the watch and the wearable computer. It discusses how the locations where the watch was worn on the body has changed over t...