Sciweavers

651 search results - page 7 / 131
» Security of Electronic Money
Sort
View
ASIACRYPT
2003
Springer
13 years 11 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
ATAL
2003
Springer
14 years 23 days ago
On optimal outcomes of negotiations over resources
We analyse scenarios in which self-interested agents negotiate with each other in order to agree on deals to exchange resources. We consider two variants of the framework, one whe...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...
I3E
2001
196views Business» more  I3E 2001»
13 years 9 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
13 years 12 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
HCI
2009
13 years 5 months ago
txteagle: Mobile Crowdsourcing
We present txteagle, a system that enables people to earn small amounts of money by completing simple tasks on their mobile phone for corporations who pay them in either airtime or...
Nathan Eagle