We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
In this paper we address the weaknesses of current EC applications related to their lack of support for the customer to recognize other people, either other customers or vendors o...
There has been tremendous growth in electronic commerce over the past few years. This growth is expected to sustain momentum in the future. Hence, the Internet has become an essent...
With the ever increasing availability of the Internet and electronic media rich in graphical and pictorial information – for communication, commerce, entertainment, art, educati...
Pubudu Madhawa Silva, Thrasyvoulos N. Pappas, Josh...