Sciweavers

95 search results - page 8 / 19
» Credit Card Forensics
Sort
View
CQRE
1999
Springer
15 years 4 months ago
Electronic Payments: Where Do We Go from Here?
Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potentia...
Markus Jakobsson, David M'Raïhi, Yiannis Tsio...
PKC
2009
Springer
115views Cryptology» more  PKC 2009»
16 years 8 days ago
Compact CCA-Secure Encryption for Messages of Arbitrary Length
This paper proposes a chosen-ciphertext secure variant of the ElGamal public-key encryption scheme which generates very compact ciphertexts for messages of arbitrary length. The ci...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
FC
2004
Springer
75views Cryptology» more  FC 2004»
15 years 5 months ago
Peppercoin Micropayments
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
Ronald L. Rivest
ICWS
2007
IEEE
15 years 1 months ago
Guarding Sensitive Information Streams through the Jungle of Composite Web Services
Complex and dynamic web service compositions may introduce unpredictable and unintentional sharing of security-sensitive data (e.g., credit card numbers) as well as unexpected vul...
Jinpeng Wei, Lenin Singaravelu, Calton Pu
DMIN
2006
133views Data Mining» more  DMIN 2006»
15 years 1 months ago
A Fuzzy Neural Based Data Classification System
Data mining has emerged to be a very important research area that helps organizations make good use of the tremendous amount of data they have. In data classification tasks, fuzzy ...
Luong Trung Tuan, Suet Peng Yong