We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Moving a brain-computer interface from a laboratory demonstration to real-life applications poses severe challenges to the BCI community. Recently, with advances in the biomedical ...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
The topic of the paper concerns the implementation and use of standards. The standards which are in focus in the paper include conceptual models and descriptions of the functionali...
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...