Building trust in the electronic market through an economic incentive mechanism
ICIS '99 Proceedings of the 20th international conference on Information Systems
Some thoughts on agent trust and delegation
Proceedings of the fifth international conference on Autonomous agents
The Dynamics of the Electronic Market: An Evolutionary Game Approach
Information Systems Frontiers
Wrappers-a mechanism to support state-based authorisation in Web applications
Data & Knowledge Engineering - Data and applications security
System Insecurity in the Internet Age
IEEE Software
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Maintaining the Validity of Digital Signatures in B2B Applications
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
SECURE: A Simulation Tool for PKI Design
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Building trust in online auction markets through an economic incentive mechanism
Decision Support Systems
Authorization Methods for E-Commerce Applications
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Payment technologies for E-commerce
Payment technologies for E-commerce
Credit card-based secure online payment
Payment technologies for E-commerce
Information Systems Frontiers
Communications of the ACM - Special issue: RFID
A review of information security issues and respective research contributions
ACM SIGMIS Database
Science of Computer Programming
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Towards secure XML document with usage control
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Hi-index | 0.00 |