-
1
-
-
0038898605
-
-
Sept.
-
Forrester Research. Post-web retail. Sept. 1999. http://forrester.com/.
-
(1999)
Post-web Retail
-
-
-
2
-
-
33646516638
-
-
US Census Bureau - http://www.census.gov/estats
-
-
-
-
4
-
-
0031606465
-
Trust in electronic Commerce: Definition and theoretical considerations
-
Anil Kini, Joobin Choobineh: Trust in Electronic Commerce: Definition and Theoretical Considerations. HICSS (4) 1998: 51-61.
-
(1998)
HICSS
, vol.4
, pp. 51-61
-
-
Kini, A.1
Choobineh, J.2
-
11
-
-
0039456088
-
Internet privacy concerns confirm the case for intervention
-
R. Clarke. Internet Privacy Concerns Confirm the Case for Intervention. Comm. of the ACM. Vol. 42, No. 2, 1999.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.2
-
-
Clarke, R.1
-
13
-
-
33947186222
-
Investigating the relationship between Internet Privacy Concerns and Online Purchasing Behaviour
-
M. Brown, R. Muchira. Investigating the relationship between Internet Privacy Concerns and Online Purchasing Behaviour. Journal of Electronic Commerce Research. Vol. 5, No. 1, 2004.
-
(2004)
Journal of Electronic Commerce Research
, vol.5
, Issue.1
-
-
Brown, M.1
Muchira, R.2
-
15
-
-
0001777423
-
Anonymous web transaction with Crowds
-
M. K. Reiter, A. D. Rubin. Anonymous web transaction with Crowds. Comm. of the ACM. Vol. 42, No. 2, 1999.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.2
-
-
Reiter, M.K.1
Rubin, A.D.2
-
16
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
16.D. L. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. Comm. of the ACM. Vol. 24, No. 2, 1981.
-
(1981)
Comm. of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.L.1
-
17
-
-
8344266879
-
Authentication and Authorization Infrastructures (AAIs): A comparative survey
-
Elsevier (North Holand)
-
17.J. Lopez, R. Oppliger, G. Pernul. Authentication and Authorization Infrastructures (AAIs): A Comparative Survey. Computers & Security Journal. Elsevier (North Holand), Vol. 23, 2004.
-
(2004)
Computers & Security Journal
, vol.23
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
18
-
-
33646525696
-
Approaches to the security of information systems
-
S. Katsikas, D. Gritzalis and S. Gritzalis (Eds.): New Technologies Publications, Athens, Greece, In Greek
-
18.E. Kiountouzis: Approaches to the security of information systems. In S. Katsikas, D. Gritzalis and S. Gritzalis (Eds.): Information Systems Security, New Technologies Publications, Athens, Greece, 2004 (In Greek).
-
(2004)
Information Systems Security
-
-
Kiountouzis, E.1
-
20
-
-
31544454555
-
Electronic commerce
-
D. E. Denning & P. J. Denning (Eds), Addison-Wesley & ACM Press
-
20. P. J. Denning, "Electronic Commerce", in D. E. Denning & P. J. Denning (Eds), Internet Besieged, Addison-Wesley & ACM Press, 1998.
-
(1998)
Internet Besieged
-
-
Denning, P.J.1
-
21
-
-
31544463390
-
Trust for electronic commerce transactions
-
Springer-Verlag
-
21.G. Pernul, A. Rohm and G. Herrmann, "Trust for Electronic Commerce Transactions", in Proceedings, ADBIS '99, Springer-Verlag, 1999.
-
(1999)
Proceedings, ADBIS '99
-
-
Pernul, G.1
Rohm, A.2
Herrmann, G.3
-
24
-
-
33646516640
-
-
http://www.wipo.int/clea/en/index.jsp
-
-
-
-
25
-
-
33646523843
-
-
http://www.wipo.int/treaties/en
-
-
-
-
27
-
-
2142790281
-
User requirements of trusted third parties in europe
-
D. Lekkas, S.K. Katsikas, D.D. Spinellis, P. Gladychev and A. Patel, "User Requirements of Trusted Third Parties in Europe", in Proceedings, User identification and Privacy Protection Joint IFIP WG 8.5 and WG 9.6 Working Conference, pp. 229-242, 1999.
-
(1999)
Proceedings, User Identification and Privacy Protection Joint IFIP WG 8.5 and WG 9.6 Working Conference
, pp. 229-242
-
-
Lekkas, D.1
Katsikas, S.K.2
Spinellis, D.D.3
Gladychev, P.4
Patel, A.5
-
28
-
-
0043249777
-
Securing the electronic market: The KEYSTONE public key infrastructure architecture
-
S. Gritzalis, S.K.Katsikas, D. Lekkas, K. Moulinos, E. Polydorou, "Securing the electronic market: The KEYSTONE Public Key Infrastructure Architecture", Computers and Security, Vol. 19, no. 8, pp. 731-746, 2000.
-
(2000)
Computers and Security
, vol.19
, Issue.8
, pp. 731-746
-
-
Gritzalis, S.1
Katsikas, S.K.2
Lekkas, D.3
Moulinos, K.4
Polydorou, E.5
-
32
-
-
33646516636
-
Trust and Privacy in Digital Business
-
Sokratis K. Katsikas, Javier Lopez, Günther Pernul (Eds.): First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings. Springer
-
Sokratis K. Katsikas, Javier Lopez, Günther Pernul (Eds.): Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings. Lecture Notes in Computer Science 3184 Springer 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3184
-
-
-
33
-
-
33646516635
-
Trust, privacy and security in digital business
-
Sokratis K. Katsikas, Javier Lopez, Günther Pernul (Eds.): Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 2005, Proceedings. Springer
-
Sokratis K. Katsikas, Javier Lopez, Günther Pernul (Eds.): Trust, Privacy and Security in Digital Business, Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 2005, Proceedings. Lecture Notes in Computer Science 3592, Springer 2005
-
(2005)
Lecture Notes in Computer Science
, vol.3592
-
-
|