Sciweavers

36 search results - page 7 / 8
» An Investigation of the Negotiation Domain for Electronic Co...
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 10 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
HICSS
2005
IEEE
169views Biometrics» more  HICSS 2005»
13 years 12 months ago
Developing E-Government Integrated Infrastructures: A Case Study
The Public Domain (PD) always serves as an agent to provide better and reliable services and information to citizens. Recent advancements in technology, citizen-demand and new pub...
Marinos Themistocleous, Zahir Irani, Peter E. D. L...
WECWIS
2003
IEEE
132views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Page Digest for Large-Scale Web Services
The rapid growth of the World Wide Web and the Internet has fueled interest in Web services and the Semantic Web, which are quickly becoming important parts of modern electronic c...
Daniel Rocco, David Buttler, Ling Liu
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
SIGECOM
2006
ACM
385views ECommerce» more  SIGECOM 2006»
14 years 5 days ago
B2C e-commerce development in Africa: case study of Botswana
The global wave of ICT development has become a strong driving force in almost every aspect of human endeavor. Electronic commerce (e-commerce) is fast gaining a prominent place i...
Faith-Michael E. Uzoka, Geoffrey G. Seleka