Sciweavers

1605 search results - page 279 / 321
» E-commerce Security Issues
Sort
View
EUROSSC
2008
Springer
14 years 10 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
CN
2010
164views more  CN 2010»
14 years 9 months ago
Attribute-based on-demand multicast group setup with membership anonymity
In many applications, it is desired to dynamically establish temporary multicast groups for secure message delivery. It is also often the case that the group membership informatio...
Shucheng Yu, Kui Ren, Wenjing Lou
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 9 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
CSI
2010
91views more  CSI 2010»
14 years 9 months ago
Towards trustworthy e-voting using paper receipts
Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proofs or confirming evidences of their honesty. This lack of trust...
Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo...
ECRA
2008
121views more  ECRA 2008»
14 years 9 months ago
Past, present and future of mobile payments research: A literature review
The mobile payment services markets are currently under transition with a history of numerous tried and failed solutions, and a future of promising but yet uncertain possibilities...
Tomi Dahlberg, Niina Mallat, Jan Ondrus, Agnieszka...