Sciweavers

585 search results - page 116 / 117
» Blind Electronic Commerce
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGECOM
2008
ACM
188views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Predicting trusts among users of online communities: an epinions case study
Trust between a pair of users is an important piece of information for users in an online community (such as electronic commerce websites and product review websites) where users ...
Haifeng Liu, Ee-Peng Lim, Hady Wirawan Lauw, Minh-...
SIGECOM
2008
ACM
131views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Truthful germs are contagious: a local to global characterization of truthfulness
We study the question of how to easily recognize whether a social unction f from an abstract type space to a set of outcomes is truthful, i.e. implementable by a truthful mechanis...
Aaron Archer, Robert Kleinberg
CN
2000
130views more  CN 2000»
13 years 7 months ago
Automating Web navigation with the WebVCR
Recent developments in Web technology such as the inclusion of scripting languages, frames, and the growth of dynamic content, have made the process of retrieving Web content more...
Vinod Anupam, Juliana Freire, Bharat Kumar, Daniel...