Sciweavers

328 search results - page 55 / 66
» On the Enactability of Business Protocols
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
14 years 2 months ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein
ICCAD
1998
IEEE
153views Hardware» more  ICCAD 1998»
14 years 2 months ago
Intellectual property protection by watermarking combinational logic synthesis solutions
The intellectual property (IP) business model is vulnerable to a number of potentially devastating obstructions, such as misappropriation and intellectual property fraud. We propo...
Darko Kirovski, Yean-Yow Hwang, Miodrag Potkonjak,...
HOTOS
2009
IEEE
14 years 1 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
CAISE
2004
Springer
14 years 1 months ago
Enhancing Application Interoperability and Enabling B2B Transactions over the Internet for Small and Medium Enterprises: The PRA
Abstract. The paper presents an approach towards executing transactions between enterprises, governmental bodies and banking institutions, based on ERP applications connected over ...
Yannis Charalabidis, Stelios Pantelopoulos