In this paper, we present an approach that aims to study users' past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users requir...
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities. It can be found in open and distributed environment...
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...