Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
To overcome the limitations of current technologies for remote collaboration, we propose a system that changes a video feed based on task properties, people’s actions, and messa...
Jiazhi Ou, Lui Min Oh, Susan R. Fussell, Tal Blum,...
Abstract. We describe a web-based system to support groups in elaborating participatory budgets. Rather than using physical meetings with voting mechanisms, we promote virtual meet...
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...