Sciweavers

651 search results - page 122 / 131
» Security of Electronic Money
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
14 years 3 days ago
A reputation system for selling human computation
We describe a reputation-driven market that motivates human computation sellers (workers) to produce optimal levels of quality when quality is not immediately measurable and contr...
Trevor Burnham, Rahul Sami
RE
2001
Springer
13 years 12 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
DIM
2007
ACM
13 years 11 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
ICCCN
2007
IEEE
13 years 11 months ago
Principles of IEEE 802.11s
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "s". 802.11s develo...
Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Dent...
ACMICEC
2006
ACM
117views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
Practical secrecy-preserving, verifiably correct and trustworthy auctions
We present a practical protocol based on homomorphic cryptography for conducting provably fair sealed-bid auctions. The system preserves the secrecy of the bids, even after the an...
David C. Parkes, Michael O. Rabin, Stuart M. Shieb...