Sciweavers

791 search results - page 137 / 159
» Users and Trust in Cyberspace
Sort
View
CSREASAM
2006
13 years 9 months ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...
IADIS
2004
13 years 9 months ago
A Model of E-Commerce for the Highly Valuable Traditional Products in Thailand
As e-commerce is considered an excellent alternative for business to reach new customers, interests in design principles for e-commerce websites, are increasing. However, not many...
Sakuna Vanichvisuttikul, Chamnong Jungthirapanich
I3E
2001
126views Business» more  I3E 2001»
13 years 9 months ago
Symbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
Sebastian Fischmeister, Günther Hagleitner, W...
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
P2PKM
2004
13 years 9 months ago
RDFGrowth, a P2P annotation exchange algorithm for scalable Semantic Web applications
We present RDFGrowth, an algorithm that addresses a specific yet important scenario: large scale, end user targeted, metadata exchange P2P applications. In this scenario, peers per...
Giovanni Tummarello, Christian Morbidoni, Joackin ...