Sciweavers

289 search results - page 4 / 58
» A New Method to Security Electronic Commerce Protocol
Sort
View
ECRA
2007
113views more  ECRA 2007»
13 years 7 months ago
Exclusions and related trust relationships in multi-party fair exchange protocols
Some electronic commerce transactions are inherently performed between more than two parties. In this context, it is thus important to determine whether the underlying fair exchan...
Nicolás González-Deleito, Olivier Ma...
HICSS
1997
IEEE
151views Biometrics» more  HICSS 1997»
13 years 11 months ago
Intelligent Agent Based Contract Process in Electronic Commerce: UNIK-AGENT Approach
As the second generation of electronic commerce, the framework of agent based commerce is proposed. Since the communication messages and solution methods of agents are significant...
Jae Kyu Lee, Woongkyu Lee
WPES
2003
ACM
14 years 26 days ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
ACSAC
1999
IEEE
13 years 12 months ago
Modular Fair Exchange Protocols for Electronic Commerce
Recently, research has focused on enabling fair exchange between payment and electronically shipped items. The reason for this is the growing importance of Electronic Commerce and...
Holger Vogt, Henning Pagnia, Felix C. Gärtner
CSFW
1999
IEEE
13 years 12 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song