Sciweavers

56 search results - page 9 / 12
» Corporate Policies for Electronic Commerce
Sort
View
WWW
2007
ACM
14 years 8 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
WWW
2006
ACM
14 years 8 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
SAC
2004
ACM
14 years 26 days ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
NSPW
2006
ACM
14 years 1 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
CIMCA
2005
IEEE
14 years 1 months ago
Topic-Based Audience Metrics for Internet Marketing by Combining Ontologies and Output Page Mining
In Internet marketing, Web audience analysis is essential to understanding the visitors’ needs. However, the existing analysis tools fail to deliver summarized and conceptual me...
Jean-Pierre Norguet, Esteban Zimányi