Sciweavers

218 search results - page 18 / 44
» Privacy in Distributed Electronic Commerce
Sort
View
65
Voted
CSFW
2000
IEEE
15 years 2 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
68
Voted
ACISP
1999
Springer
15 years 1 months ago
Evolution of Fair Non-repudiation with TTP
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transac...
Jianying Zhou, Robert H. Deng, Feng Bao
AGENTS
1998
Springer
15 years 1 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
ERCIMDL
1998
Springer
146views Education» more  ERCIMDL 1998»
15 years 1 months ago
METU-Emar: An Agent-Based Electronic Marketplace on the Web
Abstract. In this paper, we describe a scenario for a distributed marketplace on the Web where resource discovery agents find out about resources that may want to join the marketpl...
Asuman Dogac, Ilker Durusoy, Sena Nural Arpinar, E...
EDOC
2002
IEEE
15 years 2 months ago
Discretionary Enforcement of Electronic Contracts
As in traditional commerce, parties to a contract in ebusiness environments are expected to operate in good faith and comply with mutually agreed terms of contract. It may be the ...
Zoran Milosevic, Audun Jøsang, Theodosis Di...