-
1
-
-
35248831179
-
CAPTCHA: Telling humans and computers apart
-
Springer
-
L. von Ahn, M. Blum, N.J. Hopper and J. Langford, CAPTCHA: Telling humans and computers apart, in: Advances in Cryptology: Proceedings of Eurpoypt 03, Springer, 2003, pp. 294-311.
-
(2003)
Advances in Cryptology: Proceedings of Eurpoypt 03
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
2
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Springer
-
B. Aiello, Y. Ishai and O. Reingold, Priced oblivious transfer: How to sell digital goods, in: Advances in Cryptology: Proceedings of Eurocrypt 01, Springer, 2001, pp. 119-135.
-
(2001)
Advances in Cryptology: Proceedings of Eurocrypt 01
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
3
-
-
33751050410
-
Privacy-preserving demographic filtering
-
Dijon, France
-
E. Aïmeur, G. Brassard, J.M. Fernandez and F.S. Mani Onana, Privacy-preserving demographic filtering, in: Proceedings of 21st Annual ACM Symposium on Applied Computing, Dijon, France, 2006, pp. 872-878.
-
(2006)
Proceedings of 21st Annual ACM Symposium on Applied Computing
, pp. 872-878
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Mani Onana, F.S.4
-
4
-
-
53449102514
-
ALAMBIC: A privacy-preserving recommender system for electronic commerce
-
2007
-
E. Aïmeur, G. Brassard, J.M. Fernandez and F.S. Mani Onana, ALAMBIC: A privacy-preserving recommender system for electronic commerce, ACM Transactions on Internet Technology 7(3) (2007).
-
ACM Transactions on Internet Technology
, vol.7
, Issue.3
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Mani Onana, F.S.4
-
5
-
-
77954502613
-
Blind sales in electronic commerce
-
Delft, The Netherlands
-
E. Aïmeur, G. Brassard and F.S. Mani Onana, Blind sales in electronic commerce, in: Proceedings of the 6th International Conference on Electronic Commerce (ICEC'04), Delft, The Netherlands, 2004. pp. 148-157.
-
(2004)
Proceedings of the 6th International Conference on Electronic Commerce (ICEC'04)
, pp. 148-157
-
-
Aïmeur, E.1
Brassard, G.2
Mani Onana, F.S.3
-
6
-
-
84910075533
-
Blind negotiation in electronic commerce
-
Montréal, Canada
-
E. Aïmeur, G. Brassard and F.S. Mani Onana, Blind negotiation in electronic commerce, in: Proceedings of Montreal Conference on eTechnologies 2005, Montréal, Canada, 2005, pp. 35-43.
-
(2005)
Proceedings of Montreal Conference on eTechnologies 2005
, pp. 35-43
-
-
Aïmeur, E.1
Brassard, G.2
Mani Onana, F.S.3
-
7
-
-
33751029832
-
Privacy-preserving physical delivery in electronic commerce
-
Porto, Portugal
-
E. Aïmeur, G. Brassard and F.S. Mani Onana, Privacy-preserving physical delivery in electronic commerce, in: Proceedings of IADIS International Conference on e-Commerce, Porto, Portugal, 2005. pp. 25-33.
-
(2005)
Proceedings of IADIS International Conference on e-Commerce
, pp. 25-33
-
-
Aïmeur, E.1
Brassard, G.2
Mani Onana, F.S.3
-
8
-
-
33845202988
-
Secure anonymous physical delivery
-
E. Aïmeur, G. Brassard and F.S. Mani Onana, Secure anonymous physical delivery, IADIS International Journal on WWW/Internet 4(1) (2006), 55-59.
-
(2006)
IADIS International Journal on WWW/Internet
, vol.4
, Issue.1
, pp. 55-59
-
-
Aïmeur, E.1
Brassard, G.2
Mani Onana, F.S.3
-
9
-
-
0010248276
-
Attitudes and customer behavior: A decision model
-
L. Preston, ed., California Institute of Business and Economics Research, University of California
-
A. Andreasen, Attitudes and customer behavior: A decision model, in: New Research in Marketing, L. Preston, ed., California Institute of Business and Economics Research, University of California, 1965, pp. 1-16.
-
(1965)
New Research in Marketing
, pp. 1-16
-
-
Andreasen, A.1
-
11
-
-
33645586953
-
The anonymizer: Protecting user privacy on the web
-
J. Boyan, The Anonymizer: Protecting user privacy on the Web, Computer-Mediated Communication Magazine 4(9) (1997).
-
(1997)
Computer-mediated Communication Magazine
, vol.4
, Issue.9
-
-
Boyan, J.1
-
12
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
Springer
-
G. Brassard, C. Crépeau and J.-M. Robert, All-or-nothing disclosure of secrets, in: Advances in Cryptology: Proceedings of Crypto 86, Springer, 1987, pp. 234-238.
-
(1987)
Advances in Cryptology: Proceedings of Crypto 86
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
13
-
-
0036959356
-
Hybrid recommender systems: Survey and experiments
-
R. Burke, Hybrid recommender systems: Survey and experiments, User Modeling and User-Adapted Interaction 12(4) (2002), 331-370.
-
(2002)
User Modeling and User-adapted Interaction
, vol.12
, Issue.4
, pp. 331-370
-
-
Burke, R.1
-
15
-
-
0036082701
-
Collaborative filtering with privacy
-
IEEE Computer Society Press, Oakland, CA
-
J. Canny, Collaborative filtering with privacy, in: Proceedings of 23rd IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 2002, pp. 45-57.
-
(2002)
Proceedings of 23rd IEEE Symposium on Security and Privacy
, pp. 45-57
-
-
Canny, J.1
-
17
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM 24(2) (1981), 84-90.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
20
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
D. Chaum, Security without identification: Transaction systems to make Big Brother obsolete, Communications of the ACM 28(10) (1985), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
21
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan, Private information retrieval, in: Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science, 1995, pp. 41-51.
-
(1995)
Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
22
-
-
0004046658
-
-
Technical Report 148, Department of Computer Science, University of Auckland
-
C. Collberg, C. Thomborson and D. Low, A Taxonomy of Obfuscating Transformations, Technical Report 148, Department of Computer Science, University of Auckland, 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
24
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Springer
-
C. Crépeau, Equivalence between two flavours of oblivious transfers, in: Advances in Cryptology: Proceedings of Crypto 87, Springer, 1988, pp. 350-354.
-
(1988)
Advances in Cryptology: Proceedings of Crypto 87
, pp. 350-354
-
-
Crépeau, C.1
-
26
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31(4) (1985), 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
28
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM 28(6) (1985), 637-647.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
29
-
-
0012207557
-
Consistent, yet anonymous, web access with LPWA
-
E. Gabber, P.B. Gibbons, D.M. Kristol, Y. Matias and A.J. Mayer, Consistent, yet anonymous, web access with LPWA, Communications of the ACM 42(2) (1999), 42-47.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 42-47
-
-
Gabber, E.1
Gibbons, P.B.2
Kristol, D.M.3
Matias, Y.4
Mayer, A.J.5
-
30
-
-
85039253075
-
-
accessed on 7 July 2006
-
Geobytes, Inc., IP address locator tool, www.geobytes.com/IpLocator.htm, accessed on 7 July 2006.
-
IP Address Locator Tool
-
-
-
31
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz and T. Malkin, Protecting data privacy in private information retrieval schemes, in: Proceedings of 30th Annual ACM Symposium on the Theory of Computing, 1998, pp. 151-160.
-
(1998)
Proceedings of 30th Annual ACM Symposium on the Theory of Computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
32
-
-
0005063385
-
Onion routing for anonymous and private Internet connections
-
D.M. Goldschlag, M.G. Reed and P.F. Syverson, Onion routing for anonymous and private Internet connections, Communications of the ACM 42(2) (1999), 39-41.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
33
-
-
85039251108
-
-
accessed on 7 July 2006
-
Guardster, Ltd., About Guardster, www.guardster.com/?Home- About_Guardster, accessed on 7 July 2006.
-
About Guardster
-
-
-
34
-
-
0032093057
-
Agent-mediated electronic commerce: A survey
-
R.H. Guttman, A.G. Moukas and P. Maes, Agent-mediated electronic commerce: A survey, Knowledge Engineering Review Journal 13(3) (1998), 985-1003.
-
(1998)
Knowledge Engineering Review Journal
, vol.13
, Issue.3
, pp. 985-1003
-
-
Guttman, R.H.1
Moukas, A.G.2
Maes, P.3
-
36
-
-
0012949054
-
Can information technology revitalize your customer service?
-
B. Ives and R. Mason, Can information technology revitalize your customer service? Academy of Management Executive 4(4) (1990), 52-69.
-
(1990)
Academy of Management Executive
, vol.4
, Issue.4
, pp. 52-69
-
-
Ives, B.1
Mason, R.2
-
38
-
-
0017959977
-
Secure communications over insecure channels
-
R.C. Merkle, Secure communications over insecure channels, Communications of the ACM 21(4) (1978), 294-299.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
41
-
-
85039254031
-
-
accessed on 7 July 2006
-
Network-Tools.com, Tools to trace a user, www.network-tools.com, accessed on 7 July 2006.
-
Tools to Trace a User
-
-
-
43
-
-
85039246937
-
-
accessed on 7 July 2006
-
OCR Research Team, Weak CAPTCHAS, www.ocr-research.org.ua/list.html, accessed on 7 July 2006.
-
Weak CAPTCHAS
-
-
-
44
-
-
85039249698
-
-
accessed on 7 July 2006
-
OCR Research Team, tEABAG_3D evolution, www.ocr-research.org.ua/teabag. html, accessed on 7 July 2006.
-
tEABAG_3D Evolution
-
-
-
45
-
-
0347901898
-
-
accessed on 7 July 2006
-
Office of the High Commissioner for Human Rights, Universal declaration of human rights, www.unhchr.ch/udhr/lang/eng.htm, accessed on 7 July 2006.
-
Universal Declaration of Human Rights
-
-
-
48
-
-
33644514610
-
SVD-based collaborative filtering with privacy
-
Santa Fe, NM
-
H. Polat and W. Du, SVD-based collaborative filtering with privacy, in: Proceedings of 20th Annual ACM Symposium on Applied Computing, Santa Fe, NM, 2005, pp. 13-17.
-
(2005)
Proceedings of 20th Annual ACM Symposium on Applied Computing
, pp. 13-17
-
-
Polat, H.1
Du, W.2
-
49
-
-
0003462641
-
-
Technical memo TR-81, Aiken Computation Laboratory, Harvard University
-
M. Rabin, How to Exchange Secrets by Oblivious Transfer, Technical memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
51
-
-
0031681561
-
Towards mobile cryptography
-
IEEE Computer Society Press, Oakland, CA
-
T. Sander and C. Tschudin, Towards mobile cryptography, in: Proceedings of the 19th IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 1998, pp. 215-224.
-
(1998)
Proceedings of the 19th IEEE Symposium on Security and Privacy
, pp. 215-224
-
-
Sander, T.1
Tschudin, C.2
-
53
-
-
16444372472
-
Impacts of user privacy preferences on personalized systems - A comparative study
-
C.M. Karat, J. Blom and J. Karat, eds, Dordrecht, the Netherlands, Kluwer Academic Publishers
-
M. Teltzrow and A. Kobsa, Impacts of user privacy preferences on personalized systems - A comparative study, in: Designing Personalized User Experiences for eCommerce, C.M. Karat, J. Blom and J. Karat, eds, Dordrecht, the Netherlands, Kluwer Academic Publishers, 2004, pp. 315-332.
-
(2004)
Designing Personalized User Experiences for ECommerce
, pp. 315-332
-
-
Teltzrow, M.1
Kobsa, A.2
-
55
-
-
84958979582
-
On the security of ElGamal-based encryption
-
Yokohama, Japan
-
Y. Tsiounis and M. Yung, On the security of ElGamal-based encryption, in: International Workshop on Public Key Cryptography, PKC'98, Yokohama, Japan, 1998, pp. 117-134.
-
(1998)
International Workshop on Public Key Cryptography, PKC'98
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
56
-
-
0003725488
-
-
Prentice Hall
-
E. Turban, D. King, D. Viehland and J. Lee, Electronic Commerce, A Managerial Perspective, 4th edn, Prentice Hall, 2006.
-
(2006)
Electronic Commerce, a Managerial Perspective, 4th Edn
-
-
Turban, E.1
King, D.2
Viehland, D.3
Lee, J.4
-
57
-
-
0001998264
-
-
Manuscript written circa 1970
-
S. Wiesner, Conjugate coding, Sigact News 15(1) (1983), 78-88. (Manuscript written circa 1970.)
-
(1983)
Conjugate Coding, Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
58
-
-
2942583355
-
Information transparency in electronic marketplaces: Why data transparency may hinder the adoption of B2B exchanges
-
K. Zhu, Information transparency in electronic marketplaces: Why data transparency may hinder the adoption of B2B exchanges, Electronic Markets 12(2) (2002), 92-99.
-
(2002)
Electronic Markets
, vol.12
, Issue.2
, pp. 92-99
-
-
Zhu, K.1
-
59
-
-
2942525472
-
Information transparency of business-to-business electronic markets: A game-theoretic analysis
-
K. Zhu, Information transparency of business-to-business electronic markets: A game-theoretic analysis, Management Science 50(5) (2004), 670-685.
-
(2004)
Management Science
, vol.50
, Issue.5
, pp. 670-685
-
-
Zhu, K.1
|