Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
For realizing a tactile display for a handheld device, active touch movement should be represented on a small interface. We propose the addition of a tactile feedback mechanism fo...
NFC and RFID technologies have found their way into current mobile phones and research has presented a variety of applications using NFC/RFID tags for interaction between physical...
Gregor Broll, Susanne Keck, Paul Holleis, Andreas ...