Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
In this research, we aim to explore meaningful design directions for future photography applications with a focus on the experiences around sharing. We review a wide-rage of photo-...
The mobile phone is one of the most commonly carried pieces of personal, readily accessible digital technologies. Beyond just voice calls, they function as digital cameras, PDAs, ...
Eric Paulos, August Joki, Parul Vora, Anthony Burk...
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...