Sciweavers

1694 search results - page 276 / 339
» ECommerce
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 9 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
ICEIS
2002
IEEE
15 years 9 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
IPPS
2002
IEEE
15 years 9 months ago
Approximate String Matching in LDAP Based on Edit Distance
As the E-Commerce rapidly grows up, searching data is almost necessary in every application. Approximate string matching problems play a very important role to search with errors....
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
15 years 9 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
163
Voted
DIM
2009
ACM
15 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad