Sciweavers

651 search results - page 2 / 131
» Security of Electronic Money
Sort
View
IEEEARES
2010
IEEE
13 years 12 months ago
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats
Almost every company needs to process invoices to either claim money from their customers or to pay for products or services. Although companies are allowed to electronically proce...
Michael Netter, Eduardo B. Fernández, G&uum...
FTDCS
1997
IEEE
13 years 11 months ago
Distributed Transaction Processing as a Reliability Concept for Mobile Agents
Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their impl...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
ESMART
2001
Springer
14 years 13 hour ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
PDPTA
2000
13 years 8 months ago
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
AMAST
2000
Springer
13 years 12 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri