Sciweavers

594 search results - page 70 / 119
» Atomicity in Electronic Commerce
Sort
View
AMC
2005
158views more  AMC 2005»
13 years 8 months ago
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
At the fourth ACM conference on electronic commerce (EC'03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature scheme using pairings (actually, this is a...
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 8 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
CSI
2004
353views more  CSI 2004»
13 years 8 months ago
Design and implementation of a mobile database for Java phones
Due to the popularity of electronic commerce and the maturity of wireless technology, mobile users can access the Internet anytime anywhere without having to physically hook up an...
Eric Jui-Lin Lu, Yung-Yuan Cheng
CSSE
2004
IEEE
13 years 8 months ago
Trustable B2C markets on the semantic web
Abstract. Semantic Web technologies will deeply influence the further development of the Internet Economy. A major challenge is, however, to find a practical solution for trust pro...
Robert Tolksdorf, Christian Bizer, Rainer Eckstein...
AIEDAM
1998
108views more  AIEDAM 1998»
13 years 8 months ago
Web-based configuration assistants
Configuration assistants are tools for guiding the final user in simple configuration tasks, such as product assembling and customisation or study plans generation. For their wide ...
Giuseppe Attardi, Antonio Cisternino, Maria Simi