Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Widgets are small and focused multimedia applications that can be found on desktop computers, mobile devices or even TV sets. Widgets rely on structured documents to describe thei...
Cyril Concolato, Jean Le Feuvre, Jean-Claude Dufou...
We believe intelligence does not dwell solely in brain but emerges from active interactions with environments through perception, action, and communication. This paper give an over...
We introduce a system that allows four users to each receive sound from a private audio channel while using a shared tabletop display. In order to explore how private audio channe...
Meredith Ringel Morris, Dan Morris, Terry Winograd