We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Abstract. Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how autonomously an application sh...
Abstract--The increasing demand for virtual reality applications in several scientific disciplines feeds new research perspectives dealing with robotics, automation, and computer s...
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
—Error robust video communication for hand-held devices is a delicate task because of limited computational resources and hostile channel conditions in mobile environments. The l...