Sciweavers

116 search results - page 21 / 24
» Selling Privacy at Auction
Sort
View
69
Voted
CHI
2005
ACM
15 years 10 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
NORDSEC
2009
Springer
15 years 4 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
79
Voted
IEEEARES
2007
IEEE
15 years 4 months ago
On Coercion-Resistant Electronic Elections with Linear Work
Remote electronic voting over the Internet is a promising concept to afford convenience to voters and to increase election turnouts. However, before employing electronic voting sy...
Stefan G. Weber, Roberto Araujo, Johannes Buchmann
85
Voted
AGENTS
2001
Springer
15 years 2 months ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis
IEEEARES
2009
IEEE
14 years 8 months ago
Reducing the Cost of Session Key Establishment
Scenarios such as online banking, mobile payment systems, stock trading, selling merchandise, and a host of other applications that need a high level of security have moved from th...
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi S...