Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols e...
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas En...
We present an adaptive museum guidance system called PhoneGuide. It uses camera-equipped mobile phones for on-device object recognition in ad-hoc sensor networks and provides locat...
In a world of ad-hoc networks, highly interconnected mobile devices and increasingly large supercomputer clusters, students need models of computation that help them think about d...