Sciweavers

8655 search results - page 391 / 1731
» Challenges for Trusted Computing
Sort
View
EDCC
2005
Springer
15 years 9 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
IPPS
2003
IEEE
15 years 9 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
143
Voted
NDSS
2003
IEEE
15 years 9 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
DSN
2002
IEEE
15 years 9 months ago
Distributed Object Middleware to Support Dependable Information Sharing between Organisations
Organisations increasingly use the Internet to offer their own services and to utilise the services of others. This naturally leads to information sharing across organisational bo...
Nick Cook, Santosh K. Shrivastava, Stuart M. Wheat...
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell