We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
Staying in touch with extended family members can be a challenge in part because of the time and effort required, even with the help of current technologies. To explore the value ...
A. J. Bernheim Brush, Kori M. Inkpen, Kimberly Tee
We examine whether or not it is possible to determine, recognize and/or report the emotional state of a group of people through touch and/or body motion. We present the initial des...
Omar Mubin, Abdullah Al Mahmud, Christoph Bartneck
: This paper reports on a four-week study of the usage of myTeam, a prototype that provides availability awareness for distributed work groups through the use of sensor data. Autom...
Jennifer Lai, Sachiko Yoshihama, Thomas Bridgman, ...