Sciweavers

651 search results - page 38 / 131
» Security of Electronic Money
Sort
View
CEC
2008
IEEE
14 years 3 months ago
Automatic model type selection with heterogeneous evolution: An application to RF circuit block modeling
— Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a cost effe...
Dirk Gorissen, Luciano De Tommasi, Jeroen Croon, T...
ACMSE
2004
ACM
14 years 2 months ago
Trustworthiness in e-commerce
Usability has often been sold as the silver bullet for solving the problems of unprofitable online stores. Although better usability will generally improve these sites and their p...
Patricia Lanford, Roland Hübscher
ICEGOV
2007
ACM
14 years 25 days ago
Challenges and issues in e-government project assessment
Electronic Governance (e-Governance) has received a tremendous interest world over. Significant amount of money is being put into making e-Governance a reality. A number of Projec...
Piyush Gupta
EUROCRYPT
1995
Springer
14 years 16 days ago
Fair Blind Signatures
Abstract. A blind signature scheme is a protocol for obtaining a signature from a signer such that the signer's view of the protocol cannot be linked to the resulting message-...
Markus Stadler, Jean-Marc Piveteau, Jan Camenisch
ESORICS
2002
Springer
14 years 8 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...