Sciweavers

163 search results - page 20 / 33
» What Instills Trust
Sort
View
CSIE
2009
IEEE
14 years 2 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
IEEEARES
2008
IEEE
14 years 1 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
MDAI
2007
Springer
14 years 1 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
IAT
2005
IEEE
14 years 1 months ago
Automatic Generation of Self-controlled Autonomous Agents
Being able to trust in a system behavior is of prime importance, particularly within the context of critical applications as embedded or real-time systems. We want to ensure that ...
Caroline Chopinaud, Amal El Fallah-Seghrouchni, Pa...
DIGRA
2005
Springer
14 years 28 days ago
Extending Soft Models to Game Design: Flow, Challenges and Conflicts
Challenge and conflict are elements that all game designers strive to engineer into their games. Research shows that challenge is what drives a high proportion of games players ye...
Abdennour El Rhalibi, Martin Hanneghan, Stephen Ta...