Sciweavers

1120 search results - page 71 / 224
» Trust in Electronic Environments
Sort
View
JUCS
2010
89views more  JUCS 2010»
13 years 9 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
JUCS
2010
98views more  JUCS 2010»
13 years 9 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati
CNSR
2006
IEEE
14 years 4 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
CSCW
2008
ACM
14 years 16 days ago
Linguistic mimicry and trust in text-based CMC
This study examines the relationship between linguistic mimicry and trust establishment in a text-chat environment. Twenty-six participant pairs engaged in a social dilemma invest...
Lauren E. Scissors, Alastair J. Gill, Darren Gergl...
IJSN
2006
124views more  IJSN 2006»
13 years 10 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy