The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
-- One of the benefits of a computational grid is the ability to run high-performance applications over distributed resources simply and securely. We demonstrated this benefit with...
Anand Natrajan, Michael Crowley, Nancy Wilkins-Die...
Due to the huge amount of integrated devices and sensors in everyday objects ubiquitous systems are in vicinity and will be deployed in large scales in the near future. We expect t...
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...