Mobile interfaces are evolving towards touch-based approaches. This allows users to interact with their thumb directly on the screen. Such kind of direct approaches may be fussy f...
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
When an organization faces new types of collaboration, for example after a company merger, there is a need to integrate the existing software. Two main process challenges are how ...
In order for precise evaluation of MANET applications, more realistic mobility models are needed in wireless network simulations. In this paper, we focus on the behavior of pedest...