메뉴 건너뛰기




Volumn 14, Issue 6, 2006, Pages 535-559

Blind electronic commerce

Author keywords

Blinding; Cryptography; Electronic commerce; Privacy

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; INFORMATION ANALYSIS; SECURITY OF DATA;

EID: 33845230388     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2006-14603     Document Type: Article
Times cited : (3)

References (59)
  • 9
    • 0010248276 scopus 로고
    • Attitudes and customer behavior: A decision model
    • L. Preston, ed., California Institute of Business and Economics Research, University of California
    • A. Andreasen, Attitudes and customer behavior: A decision model, in: New Research in Marketing, L. Preston, ed., California Institute of Business and Economics Research, University of California, 1965, pp. 1-16.
    • (1965) New Research in Marketing , pp. 1-16
    • Andreasen, A.1
  • 11
    • 33645586953 scopus 로고    scopus 로고
    • The anonymizer: Protecting user privacy on the web
    • J. Boyan, The Anonymizer: Protecting user privacy on the Web, Computer-Mediated Communication Magazine 4(9) (1997).
    • (1997) Computer-mediated Communication Magazine , vol.4 , Issue.9
    • Boyan, J.1
  • 13
    • 0036959356 scopus 로고    scopus 로고
    • Hybrid recommender systems: Survey and experiments
    • R. Burke, Hybrid recommender systems: Survey and experiments, User Modeling and User-Adapted Interaction 12(4) (2002), 331-370.
    • (2002) User Modeling and User-adapted Interaction , vol.12 , Issue.4 , pp. 331-370
    • Burke, R.1
  • 15
    • 0036082701 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • IEEE Computer Society Press, Oakland, CA
    • J. Canny, Collaborative filtering with privacy, in: Proceedings of 23rd IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 2002, pp. 45-57.
    • (2002) Proceedings of 23rd IEEE Symposium on Security and Privacy , pp. 45-57
    • Canny, J.1
  • 17
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM 24(2) (1981), 84-90.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 20
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • D. Chaum, Security without identification: Transaction systems to make Big Brother obsolete, Communications of the ACM 28(10) (1985), 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 24
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Springer
    • C. Crépeau, Equivalence between two flavours of oblivious transfers, in: Advances in Cryptology: Proceedings of Crypto 87, Springer, 1988, pp. 350-354.
    • (1988) Advances in Cryptology: Proceedings of Crypto 87 , pp. 350-354
    • Crépeau, C.1
  • 26
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31(4) (1985), 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 28
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM 28(6) (1985), 637-647.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 30
    • 85039253075 scopus 로고    scopus 로고
    • accessed on 7 July 2006
    • Geobytes, Inc., IP address locator tool, www.geobytes.com/IpLocator.htm, accessed on 7 July 2006.
    • IP Address Locator Tool
  • 32
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private Internet connections
    • D.M. Goldschlag, M.G. Reed and P.F. Syverson, Onion routing for anonymous and private Internet connections, Communications of the ACM 42(2) (1999), 39-41.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 33
    • 85039251108 scopus 로고    scopus 로고
    • accessed on 7 July 2006
    • Guardster, Ltd., About Guardster, www.guardster.com/?Home- About_Guardster, accessed on 7 July 2006.
    • About Guardster
  • 36
    • 0012949054 scopus 로고
    • Can information technology revitalize your customer service?
    • B. Ives and R. Mason, Can information technology revitalize your customer service? Academy of Management Executive 4(4) (1990), 52-69.
    • (1990) Academy of Management Executive , vol.4 , Issue.4 , pp. 52-69
    • Ives, B.1    Mason, R.2
  • 38
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R.C. Merkle, Secure communications over insecure channels, Communications of the ACM 21(4) (1978), 294-299.
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 41
    • 85039254031 scopus 로고    scopus 로고
    • accessed on 7 July 2006
    • Network-Tools.com, Tools to trace a user, www.network-tools.com, accessed on 7 July 2006.
    • Tools to Trace a User
  • 43
    • 85039246937 scopus 로고    scopus 로고
    • accessed on 7 July 2006
    • OCR Research Team, Weak CAPTCHAS, www.ocr-research.org.ua/list.html, accessed on 7 July 2006.
    • Weak CAPTCHAS
  • 44
    • 85039249698 scopus 로고    scopus 로고
    • accessed on 7 July 2006
    • OCR Research Team, tEABAG_3D evolution, www.ocr-research.org.ua/teabag. html, accessed on 7 July 2006.
    • tEABAG_3D Evolution
  • 45
    • 0347901898 scopus 로고    scopus 로고
    • accessed on 7 July 2006
    • Office of the High Commissioner for Human Rights, Universal declaration of human rights, www.unhchr.ch/udhr/lang/eng.htm, accessed on 7 July 2006.
    • Universal Declaration of Human Rights
  • 49
    • 0003462641 scopus 로고
    • Technical memo TR-81, Aiken Computation Laboratory, Harvard University
    • M. Rabin, How to Exchange Secrets by Oblivious Transfer, Technical memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1
  • 53
    • 16444372472 scopus 로고    scopus 로고
    • Impacts of user privacy preferences on personalized systems - A comparative study
    • C.M. Karat, J. Blom and J. Karat, eds, Dordrecht, the Netherlands, Kluwer Academic Publishers
    • M. Teltzrow and A. Kobsa, Impacts of user privacy preferences on personalized systems - A comparative study, in: Designing Personalized User Experiences for eCommerce, C.M. Karat, J. Blom and J. Karat, eds, Dordrecht, the Netherlands, Kluwer Academic Publishers, 2004, pp. 315-332.
    • (2004) Designing Personalized User Experiences for ECommerce , pp. 315-332
    • Teltzrow, M.1    Kobsa, A.2
  • 57
    • 0001998264 scopus 로고
    • Manuscript written circa 1970
    • S. Wiesner, Conjugate coding, Sigact News 15(1) (1983), 78-88. (Manuscript written circa 1970.)
    • (1983) Conjugate Coding, Sigact News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 58
    • 2942583355 scopus 로고    scopus 로고
    • Information transparency in electronic marketplaces: Why data transparency may hinder the adoption of B2B exchanges
    • K. Zhu, Information transparency in electronic marketplaces: Why data transparency may hinder the adoption of B2B exchanges, Electronic Markets 12(2) (2002), 92-99.
    • (2002) Electronic Markets , vol.12 , Issue.2 , pp. 92-99
    • Zhu, K.1
  • 59
    • 2942525472 scopus 로고    scopus 로고
    • Information transparency of business-to-business electronic markets: A game-theoretic analysis
    • K. Zhu, Information transparency of business-to-business electronic markets: A game-theoretic analysis, Management Science 50(5) (2004), 670-685.
    • (2004) Management Science , vol.50 , Issue.5 , pp. 670-685
    • Zhu, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.