A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
The web has become an important medium for news delivery and consumption. Fresh content about a variety of topics and events is constantly being created and published on the web b...
As part of a National Science Foundation-funded study, we analyze data from a 2002 Midwest urban random sample survey (n = 167 adults) of differential access to and uses of comput...
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
The development and expression of many higher level cognitive functions, such as imitation, spatial perception, and tool-use relies on a multi-modal representation of the body kno...