Sciweavers

29 search results - page 2 / 6
» End User Acceptance of Security Technology for Electronic Co...
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
13 years 11 months ago
Agent-Oriented Concepts to Foster the Automation of E-Business
Improving the efficiency of e-Business usage requires the further development of automation techniques for interorganizational business processes as a major driver. Automation ca...
Andreas Bartelt, Winfried Lamersdorf
KES
2000
Springer
13 years 10 months ago
Agent and user inhabited virtual communities: a case study
: We report about ongoing research in a virtual reality environment where visitors can interact with agents that help them to obtain information, to peform certain transactions and...
Anton Nijholt
FC
2004
Springer
88views Cryptology» more  FC 2004»
14 years 12 days ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
COMPSEC
2008
99views more  COMPSEC 2008»
13 years 7 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin