Sciweavers

1040 search results - page 127 / 208
» Privacy for Telecom Services
Sort
View
IEEEARES
2010
IEEE
14 years 5 days ago
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats
Almost every company needs to process invoices to either claim money from their customers or to pay for products or services. Although companies are allowed to electronically proce...
Michael Netter, Eduardo B. Fernández, G&uum...
AGENTS
1999
Springer
14 years 4 days ago
Shopbot Economics
Abstract. Shopbots are agents that search the Internet for information pertaining to the price and quality of goods or services. With the advent of shopbots, a dramatic reduction i...
Jeffrey O. Kephart, Amy R. Greenwald
SPW
1999
Springer
14 years 3 days ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
AGENTS
1998
Springer
14 years 3 days ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
CCS
1993
ACM
13 years 12 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman