Learn More
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly(More)
A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is undesirable for both the application author and the advertiser. Advertising libraries require their own permissions, resulting in additional permission requests to users. Likewise,(More)
Rain gardens have been recommended as a best management practice to treat stormwa-ter runoff. However, no published field performance data existed on pollutant removal capabilities. Replicated rain gardens were constructed in Haddam, CT, to capture shingled-roof runoff. The gardens were sized to store the first 2.54 cm (1 inch) of runoff. Influent, overflow(More)
Rain gardens have been recommended as a best management practice to treat stormwater runoff. Replicate rain gardens were constructed in Haddam, CT, to treat roof runoff. The objective of this study was to assess whether the creation of a saturated zone in a rain garden improved retention of pollutants. The gardens were sized to store 2.54 cm (1 in) of(More)
The low impact development (LID) approach has been recommended as an alternative to traditional stormwater design. Research on individual LID practices such as bioretention, pervious pavements , and grassed swales has increased in recent years. Bioretention cells have been effective in retaining large volumes of runoff and pollutants on site, and(More)
Client authentication on the web has remained in the internet-equivalent of the stone ages for the last two decades. Instead of adopting modern public-key-based authentication mechanisms, we seem to be stuck with passwords and cookies. In this paper, we propose to break this stalemate by presenting a fresh approach to public-key-based client authentication(More)
User authentication systems are at an impasse. The most ubiquitous method -- the password -- has numerous problems, including susceptibility to unintentional exposure via phishing and cross-site password reuse. Second-factor authentication schemes have the potential to increase security but face usability and deployability challenges. For example,(More)
Development continues at a rapid pace throughout the country. Runoff from the impervious surfaces in these watersheds continues to be a major cause of degradation to freshwater bodies and estuaries. Low impact development techniques have been recommended to reduce these impacts. In this study, stormwater runoff and pollutant concentrations were measured as(More)