Sciweavers

651 search results - page 9 / 131
» Security of Electronic Money
Sort
View
EUROSEC
2009
ACM
14 years 2 months ago
Preventing identity theft with electronic identity cards and the trusted platform module
Andreas Klenk, Holger Kinkelin, Christoph Eunicke,...
ACSAC
2000
IEEE
13 years 12 months ago
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
CHI
2007
ACM
14 years 8 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
CHI
2002
ACM
14 years 8 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
IEEEARES
2010
IEEE
14 years 2 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif