Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
: This paper describes a cost effective Wireless Sensor Network (WSN) technology for monitoring the health of dairy cows. By monitoring and understanding the cow individual and her...
Tsung Ta Wu, Swee Keow Goo, Kae Hsiang Kwong, Crai...
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
The research presented in this paper reports on three phases of an empirical user study that examines the relationship between identity and technology using contextual interviews,...
Christine Satchell, Graeme G. Shanks, Steve Howard...