In this paper we report the concept and initial prototype of a device that can be used to support evidence recovery at a crime scene. The key elements are radio frequency identifi...
Chris Baber, Paul Smith, James Cross, Damien Zasik...
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless c...
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...