Sold Out
Book Categories |
Privacy enhanced technologies : methods - markets - misuse | 1 | |
Sec-shield : security preserved distributed knowledge management between autonomous domains | 10 | |
Protection mechanisms against phishing attacks | 20 | |
Dropout-tolerant TTP-free mental poker | 30 | |
A self-heating mechanism for an intrusion tolerance system | 41 | |
Protecting online rating systems from unfair ratings | 50 | |
Anonymous payment in a fair E-commerce protocol with verifiable TTP | 60 | |
Designing secure E-tendering systems | 70 | |
A multilateral secure payment system for wireless LAN hotspots | 80 | |
Secure group communications over combined wired and wireless networks | 90 | |
A privacy enhancement mechanism for location based service architectures using transaction pseudonyms | 100 | |
Making money with mobile qualified electronic signatures | 110 | |
Efficient certificate revocation system implementation : Huffman Merkle hash tree (HuffMHT) | 119 | |
Secure index search for groups | 128 | |
Provision of secure policy enforcement between small and medium governmental organizations | 141 | |
Maximizing utility of mobile agent based E-commerce applications with trust enhanced security | 151 | |
The fuzzy and dynamic nature of trust | 161 | |
Towards an ontology of trust | 175 | |
An improved group signature scheme | 185 | |
Efficient member revocation in group signature schemes | 195 | |
Conditional digital signatures | 206 | |
A mediated proxy signature scheme with past revocation for electronic transactions | 216 | |
Privacy enforcement for IT governance in enterprises : doing it for real | 226 | |
An adaptive privacy management system for data repositories | 236 | |
Privacy preserving data mining services on the Web | 246 | |
Reading your keystroke : whose mail is it? | 256 | |
A novel construction of two-party private bidding protocols from Yao's millionaires problem | 266 | |
An improved double auction protocol against false bids | 274 | |
An investigation of dispute resolution mechanisms on power and trust : a domain study of online trust in e-Auctions | 288 | |
A secure fingerprint authentication system on an untrusted computing environment | 299 | |
Security enhancement for password authentication schemes with smart cards | 311 | |
Securing operating system services based on smart cards | 321 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionTrust, Privacy, and Security in Digital Business
X
This Item is in Your InventoryTrust, Privacy, and Security in Digital Business
X
You must be logged in to review the productsX
X
X
Add Trust, Privacy, and Security in Digital Business, This book constitutes the refereed proceedings of the Second International Conference on Trust and Privacy in Digital Business, TrustBus 2005, held in Copenhagen, Denmark, in August 2005. The 32 revised full papers presented together with an invited pa, Trust, Privacy, and Security in Digital Business to the inventory that you are selling on WonderClubX
X
Add Trust, Privacy, and Security in Digital Business, This book constitutes the refereed proceedings of the Second International Conference on Trust and Privacy in Digital Business, TrustBus 2005, held in Copenhagen, Denmark, in August 2005. The 32 revised full papers presented together with an invited pa, Trust, Privacy, and Security in Digital Business to your collection on WonderClub |