Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
Mapping of features such as texture and geometric detail is an important tool that enhances realism of surface geometry in graphics and animation. This essentially involves a tran...
Abstract. CBS is a simple and natural CCS-like calculus where processes speak one at a time and are heard instantaneously by all others. Speech is autonomous, contention between sp...