Sciweavers

289 search results - page 57 / 58
» A New Method to Security Electronic Commerce Protocol
Sort
View
SIGIR
2002
ACM
13 years 7 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
ICWS
2009
IEEE
14 years 4 months ago
Service-Oriented Architecture for Privacy-Preserving Data Mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers t...
Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. ...
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
Jian Guo 0001, Thomas Peyrin, Axel Poschmann
OOPSLA
2004
Springer
14 years 29 days ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 6 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang