Sciweavers

409 search results - page 79 / 82
» Flexible Scheduler-Independent Security
Sort
View
ACSC
2007
IEEE
14 years 1 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman
SIGUCCS
2004
ACM
14 years 27 days ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
ISEC
2001
Springer
126views ECommerce» more  ISEC 2001»
13 years 12 months ago
Building Trust for E-Commerce: Collaborating Label Bureaus
A major problem facing the full deployment of business-to-consumer (B2C) e-commerce is the development of trust on the side of the consumer. People develop trust in a business thr...
Michael A. Shepherd, Anil Dhonde, Carolyn R. Watte...
ATAL
2006
Springer
13 years 11 months ago
Evolutionary Stability of Behavioural Types in the Continuous Double Auction
In this paper, we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically, we consider behavi...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
CIT
2006
Springer
13 years 11 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji