Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we...
We propose audio networking: using ubiquitously available sound hardware (i.e. speakers, sound-cards and microphones) for lowbandwidth, wireless networking. A variety of location- ...
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the logic in order to cover cases when partial information...
Ubiquitous computing architectures enable interaction and collaboration in multi-user applications. We explore the challenges of integrating the disparate services required in such...
Romain Pellerin, Nicolas Bouillot, Tatiana Pietkie...