The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
In response to the advance of ubiquitous computing technologies, we believe that for computer systems to be ubiquitous, they must be context-aware. In this paper, we address the i...
Arthur H. van Bunningen, Ling Feng, Peter M. G. Ap...
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...