Sciweavers

791 search results - page 32 / 159
» Users and Trust in Cyberspace
Sort
View
ICDCSW
2007
IEEE
14 years 1 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
IFIP
1994
Springer
13 years 11 months ago
Research issues
This article outlines a number of important research issues in human-computer interaction in the e-commerce environment. It highlights some of the challenges faced by users in bro...
Tim Smithers
JECR
2002
251views more  JECR 2002»
13 years 7 months ago
HCI Research Issues in Electronic Commerce
This article outlines a number of important research issues in human-computer interaction in the e-commerce environment. It highlights some of the challenges faced by users in bro...
Fiona Fui-Hoon Nah, Sidney A. Davis
SIGCOMM
2010
ACM
13 years 7 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
NOMS
2006
IEEE
14 years 1 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath