Sciweavers

585 search results - page 98 / 117
» Blind Electronic Commerce
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Empowering users against sidejacking attacks
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a se...
Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al...
COMPSEC
2008
99views more  COMPSEC 2008»
13 years 7 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin
ECRA
2010
145views more  ECRA 2010»
13 years 7 months ago
Inferring preference correlations from social networks
Identifying consumer preferences is a key challenge in customizing electronic commerce sites to individual users. The increasing availability of online social networks provides on...
Tad Hogg
DSS
2008
99views more  DSS 2008»
13 years 7 months ago
A graphical shopping interface based on product attributes
Most recommender systems present recommended products in lists to the user. By doing so, much information is lost about the mutual similarity between recommended products. We prop...
Martijn Kagie, Michiel C. van Wezel, Patrick J. F....
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 7 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang