Abstract. To realize Weiser’s vision of ubiquitous computing, a popular approach has been to create so-called smart living objects, which are everyday objects in our living envir...
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14 102 diver...
Urmimala Sarkar, Andrew J. Karter, Jennifer Y. Liu...
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...