A new family of protocols, based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. These protocols are particularly suitable for authentication on mobile phones where PKI or trusted third party solutions are not practical to cover all scenarios. Rather, individuals are able… (More)
The pervasive use of mobile phones has created a dynamic computing platform that a large percentage of the population carries routinely. There is a growing trend of integrating mobile phones with electronic identity, giving the phone the ability to prove or support the identity of the owner by containing, for example, a tuple of name, ID, photo and public… (More)
In mobile computing applications the traditional name-based concept of identity is both difficult to support and frequently inappropriate. The natural alternative is to use the context in which parties sit to identify them. We discuss this issue and the ways in which Human Interactive Security Protocols (HISPs) can play a role in enabling this.
Photomechanical nanocomposites embedded with light-absorbing nanoparticles show promising applications in photoresponsive actuations. Near infrared (nIR)-responsive nanocomposites based photomechanical soft actuators can offer lightweight functional and underexploited entry into soft robotics, active optics, drug delivery, etc. A novel graphene-based… (More)
Fibroblasts, which play an important role in biological seal formation and maintenance, determine the long-term success of percutaneous implants. In this study, well-defined microporous structures with micropore diameters of 10-60 µm were fabricated by microelectromechanical systems and their influence on the fibroblast functionalities was observed. The… (More)