Sciweavers

558 search results - page 92 / 112
» Electronic commerce
Sort
View
73
Voted
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
14 years 9 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
COMCOM
2007
83views more  COMCOM 2007»
14 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
ECRA
2007
116views more  ECRA 2007»
14 years 9 months ago
Two-level workload characterization of online auctions
Online auctions are rapidly becoming one of the significant forms of electronic commerce for buying and selling goods and services. A good understanding of the workload of auctio...
Vasudeva Akula, Daniel A. Menascé
EOR
2007
96views more  EOR 2007»
14 years 9 months ago
A fast method for discovering critical edge sequences in e-commerce catalogs
Web sites allow the collection of vast amounts of navigational data – clickstreams of user traversals through the site. These massive data stores offer the tantalizing possibil...
Kaushik Dutta, Debra E. VanderMeer, Anindya Datta,...
107
Voted
KAIS
2006
77views more  KAIS 2006»
14 years 9 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...