This paper analyzes the retrospective stories of a four person team responsible for developing a new computer game for mobile phones. Our theorizing is based on an in-depth, two y...
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
An area of interest that remains to be more thoroughly investigated is that of human navigation and wayfinding in VR. This study attempted to examine the effect of gender on VR na...
CT Cellphones have the potential to improve education for the millions of underprivileged users in the developing world. However, mobile learning in developing countries remains un...