There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
This paper explores the use of camera phones with pen input as a platform for generating digital annotations to realworld objects. We analyze the client-side requirements for a ge...
Abstract. In this paper, we further develop the idea of combining pervasive computing techniques with electronic payment systems to create activity-based micro-incentives. Economic...
Recommender systems provide decision aid and information filtering functions that have a great potential application in the mobile context. An aspect which has not been extensive...