Universal mobile electrochemical detector designed for use in resource-limited applications

A Nemiroski, DC Christodouleas… - Proceedings of the …, 2014 - National Acad Sciences
This paper describes an inexpensive, handheld device that couples the most common forms
of electrochemical analysis directly to “the cloud” using any mobile phone, for use in …

Ripple: Communicating through physical vibration

N Roy, M Gowda, RR Choudhury - 12th USENIX Symposium on …, 2015 - usenix.org
This paper investigates the possibility of communicating through vibrations. By modulating
the vibration motors available in all mobile phones, and decoding them through …

VillageCell: Cost effective cellular connectivity in rural areas

A Anand, V Pejovic, EM Belding… - Proceedings of the Fifth …, 2012 - dl.acm.org
Mobile telephony brings clear economic and social benefits to its users. As handsets have
become more affordable, ownership has reached staggering numbers, even in the most …

{AuthLoop}:{End-to-End} cryptographic authentication for telephony over voice channels

B Reaves, L Blue, P Traynor - 25th USENIX Security Symposium …, 2016 - usenix.org
Telephones remain a trusted platform for conducting some of our most sensitive exchanges.
From banking to taxes, wide swathes of industry and government rely on telephony as a …

A view from the other side: Understanding mobile phone characteristics in the developing world

S Ahmad, AL Haamid, ZA Qazi, Z Zhou… - Proceedings of the …, 2016 - dl.acm.org
Mobile devices are becoming increasingly dominant in the developing world. However,
there is little insight into the characteristics of devices being used in such regions. Using a …

Inside the walled garden: Deconstructing facebook's free basics program

R Sen, S Ahmad, A Phokeer, ZA Farooq… - ACM SIGCOMM …, 2017 - dl.acm.org
Free Basics is a Facebook initiative to provide zero-rated web services in developing
countries. The program has grown rapidly to 60+ countries in the past two years. But it has …

Enforcing End-to-End Security for Remote Conference Applications

Y Liu, H Chen, Z Yang - 2024 IEEE Symposium on Security and …, 2024 - ieeexplore.ieee.org
Remote conference applications are increasingly widely used, but currently, their improper
data encryption methods, proprietary implementations, and dial-in access cause concerns …

AvCloak: A tool for black box latency measurements in video conferencing applications

A Kryczka, A Arefin, K Nahrstedt - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
The usage and number of available video conferencing (VC) applications are rising as the
high-bandwidth, low latency networks on which they depend become increasingly prevalent …

Introducing a novel data over voice technique for secure voice communication

P Krasnowski, J Lebrun, B Martin - Wireless Personal Communications, 2022 - Springer
The increasing need for privacy-preserving voice communications is encouraging the
investigation of new secure voice transmission techniques. This paper refers to the original …

How voice calls affect data in operational LTE networks

GH Tu, C Peng, H Wang, CY Li, S Lu - Proceedings of the 19th annual …, 2013 - dl.acm.org
Both voice and data are indispensable services in current cellular networks. In this work, we
study the inter-play of voice and data in operational LTE networks. We assess how the …