Sciweavers

641 search results - page 104 / 129
» Java Transactions for the Internet
Sort
View
TRUSTBUS
2010
Springer
13 years 6 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
EKNOW
2009
13 years 5 months ago
The Method for a Summarization of Product Reviews Using the User's Opinion
As the number of transactions in E-market places is growing, more and more product information and product reviews are posted on the Internet. Because customers want to purchase go...
Jung-Yeon Yang, Jaeseok Myung, Sang-goo Lee
CSREASAM
2010
13 years 5 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
JCIT
2010
99views more  JCIT 2010»
13 years 2 months ago
A Product Knowledge-Sharing System Focusing on Internet-mediated Mode
This research constructs a design-oriented, Internet-mediated, and knowledge-sharing architecture. Therein XML files serve as the basic exchange and storage format of knowledge te...
Hsin-Hsi Lai, Heng-Chang Lin, Yu-Cheng Chen