Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
LightUp is a constructionist platform to teach novices about electronics, and also a low-cost rapid-prototyping platform for more advanced users. The LightUp kit contains many bas...
Zain Asgar, Joshua Chan, Chang Liu, Paulo Blikstei...
Explicitly examining the values held by a research community provides a tool in which participants can define its culture, conduct informed research, and reflect on their design p...
Svetlana Yarosh, Iulian Radu, Seth Hunter, Eric Ro...
This paper outlines a series of experiments to develop asynchronous messaging systems for preschool aged children. Three unique systems build on a foundational design called Toast...
Hayes Raffle, Rafael Ballagas, Glenda Revelle, Koi...