Sciweavers

594 search results - page 110 / 119
» Atomicity in Electronic Commerce
Sort
View
ATAL
2005
Springer
14 years 2 months ago
Sequential auctions for objects with common and private values
Sequential auctions are an important mechanism for buying/selling multiple objects. Existing work has studied sequential auctions for objects that are exclusively either common va...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
CCS
2005
ACM
14 years 2 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...
DRM
2005
Springer
14 years 2 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
ACMICEC
2004
ACM
106views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
Measuring e-government impact: existing practices and shortcomings
Public administrations of all over the world invest an enormous amount of resources in e-government. How the success of egovernment can be measured is often not clear. E-governmen...
Rob M. Peters, Marijn Janssen, Tom M. van Engers
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk