-
1
-
-
34547462520
-
-
Patricia Seybold Group, August
-
Aldrich, S. E., Marks, R. T., Frey, M. M., Goulde, M. A., Lewis, J. M., and Seybold, P. B.. What kind of the Total Customer Experience Does Your E-business Deliver? Patricia Seybold Group, August 2000.
-
(2000)
What kind of the Total Customer Experience Does Your E-business Deliver
-
-
Aldrich, S.E.1
Marks, R.T.2
Frey, M.M.3
Goulde, M.A.4
Lewis, J.M.5
Seybold, P.B.6
-
2
-
-
0343618728
-
Defining the criteria for effective interaction design: Quality of experience
-
Alben, L. Defining the criteria for effective interaction design: Quality of experience. Interactions, 3, 3, 11-15. 1996.
-
(1996)
Interactions
, vol.3
, Issue.3
, pp. 11-15
-
-
Alben, L.1
-
3
-
-
34547396396
-
-
Accessed on July 28, 2006
-
Anonymizer Software, http://www.anonymizer.com. Accessed on July 28, 2006.
-
Anonymizer Software
-
-
-
6
-
-
34547464632
-
Proposal for Building a Privacy Guardian for the Electronic Age
-
H. Federrath, editor, Anonymity, of, Springer-Verlag
-
Borking, J. Proposal for Building a Privacy Guardian for the Electronic Age. In H. Federrath, editor, Anonymity 2000, Volume 2009 of Lecture Notes in Computer Science, Pages 130-140, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 130-140
-
-
Borking, J.1
-
8
-
-
0013243382
-
-
Accessed on July 28, 2006
-
Cranor, L., Langheinrich, M. and Marchiori, M. Platform for Privacy Preferences Project, http://w3c.org/p3p. Accessed on July 28, 2006.
-
Platform for Privacy Preferences Project
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
-
10
-
-
13244268413
-
Personal and Service Mobility in Ubiquitous Computing Environments
-
El-Khatib, K., Zhang, Z., and Bochmann, G. v. Personal and Service Mobility in Ubiquitous Computing Environments. Wireless Communications and Mobile Computing 4(6): 595-607 (2004)
-
(2004)
Wireless Communications and Mobile Computing
, vol.4
, Issue.6
, pp. 595-607
-
-
El-Khatib, K.1
Zhang, Z.2
Bochmann, G.V.3
-
11
-
-
34547484867
-
-
Empririx, Assuring QoE on Next generation Networks. White paper
-
Empririx., Assuring QoE on Next generation Networks. White paper
-
-
-
-
12
-
-
0022080529
-
A randomized Protocol for signing contracts
-
Even, S., Goldreich, O., and Lempel, A. A randomized Protocol for signing contracts. Communications of the ACM, Vol. 28, No. 6, 1985, pp. 637-647.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
85181644319
-
-
Even, S., Goldreich, O., and Lempel, A. A randomized protocol for signing contracts, (extended abstract). In Advances in Cryptology: Proceedings of Crypto 82, pages 205-210. Plenum Press, New York and London, 1983,23-25 Aug, 1982.
-
Even, S., Goldreich, O., and Lempel, A. A randomized protocol for signing contracts, (extended abstract). In Advances in Cryptology: Proceedings of Crypto 82, pages 205-210. Plenum Press, New York and London, 1983,23-25 Aug, 1982.
-
-
-
-
14
-
-
0003317098
-
How to make personalized web browsing simple, secure, and anonymous
-
97
-
Gabber, E., Gibbons, P., Matias, Y., and Mayer, A. How to make personalized web browsing simple, secure, and anonymous. In Proc. of Financial Cryptography '97 (1997).
-
(1997)
Proc. of Financial Cryptography
-
-
Gabber, E.1
Gibbons, P.2
Matias, Y.3
Mayer, A.4
-
15
-
-
84957104180
-
Two party RSA key generation
-
Gilboa, N., Two party RSA key generation, CRYPTO 1999, 116-129.
-
(1999)
CRYPTO
, pp. 116-129
-
-
Gilboa, N.1
-
16
-
-
71149116146
-
-
Goldreich, O., Micali, S., and Wigderson, A. Proofs that Yield Nothing but their Validiaty, and a Methodology of Cryptographic Protocol Design. In Journal of the ACM, 38,1991, pp. 691-729.
-
Goldreich, O., Micali, S., and Wigderson, A. Proofs that Yield Nothing but their Validiaty, and a Methodology of Cryptographic Protocol Design. In Journal of the ACM, vol. 38,1991, pp. 691-729.
-
-
-
-
17
-
-
0020943678
-
-
Halpem, J. and Rabin, M.O. A Logic to Reason about likehood. In proceedings of the 15th Annual ACM Symposium on the Theory of Computing, 1983, pp. 310-319.
-
Halpem, J. and Rabin, M.O. A Logic to Reason about likehood. In proceedings of the 15th Annual ACM Symposium on the Theory of Computing, 1983, pp. 310-319.
-
-
-
-
18
-
-
34547417020
-
-
Handley, M. and Jacobson, V. SDP.' Session Description Protocol. RFC 2327, April 1998.
-
Handley, M. and Jacobson, V. SDP.' Session Description Protocol. RFC 2327, April 1998.
-
-
-
-
21
-
-
0034507841
-
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation
-
Ishai, Y. and Kushilevitz, E., Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. IEEE Symposium on Foundations of Computer Science, 2000.
-
(2000)
IEEE Symposium on Foundations of Computer Science
-
-
Ishai, Y.1
Kushilevitz, E.2
-
22
-
-
34547450031
-
-
ITU-T Recommendation H.323. Packet-Based Multimedia Communications Systems. February 1998.
-
ITU-T Recommendation H.323. Packet-Based Multimedia Communications Systems. February 1998.
-
-
-
-
25
-
-
84974555530
-
Privacy preserving data mining
-
proc. CRYPTO, Springer
-
Lindell, Y. and Pinkas, B. Privacy preserving data mining. In proc. CRYPTO 2000, Lecture Notes in Computer Science, Vol. 1880 (Springer, 2000), pp. 36-54.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
34547465160
-
-
Accessed on July 28, 2006
-
Maxware Software, http://www.maxware.com. Accessed on July 28, 2006.
-
Maxware Software
-
-
-
27
-
-
19644371023
-
Metrics for the internet age: Quality of experience and quality of business
-
Technical report no: HPL-2001-179
-
Moorsel, A. v., Metrics for the internet age: Quality of experience and quality of business. Technical report no: HPL-2001-179, http://www.hpl.hp.com/techreports
-
-
-
Moorsel, A.V.1
-
28
-
-
0032669864
-
-
Naor, M. and Pinkas, B. Oblivious transfer and polynomial evaluation. In Proc. 31 st Ann. ACM Symp. Theory of Computing, 1999, pp. 245-254.
-
Naor, M. and Pinkas, B. Oblivious transfer and polynomial evaluation. In Proc. 31 st Ann. ACM Symp. Theory of Computing, 1999, pp. 245-254.
-
-
-
-
29
-
-
34547442394
-
-
Nilsson, M., Lindskog, H., and Fischer-Hubner, S. Privacy Enhancement in the Mobile Internet. In proceedings of the IFIP WG 9.6/11.7 Working Conference on Security and Control of IT in Society, Bratislava, June 15-16, 2001, ISBN 3-901882-13-8.
-
Nilsson, M., Lindskog, H., and Fischer-Hubner, S. Privacy Enhancement in the Mobile Internet. In proceedings of the IFIP WG 9.6/11.7 Working Conference on Security and Control of IT in Society, Bratislava, June 15-16, 2001, ISBN 3-901882-13-8.
-
-
-
-
31
-
-
1542300219
-
Preserving privacy in web services
-
Rezgui, A., Ouzzani, M., Bouguettaya, A., and Medjahed, B. Preserving privacy in web services. In proceedings of the International workshop on Web Information and Data Management, pp. 56-62, 2002.
-
(2002)
proceedings of the International workshop on Web Information and Data Management
, pp. 56-62
-
-
Rezgui, A.1
Ouzzani, M.2
Bouguettaya, A.3
Medjahed, B.4
-
32
-
-
34547435752
-
-
Richards, A., Rogers, Witana, G., V., and Antoniades, M. Mapping User Level QoS from a Single Parameter. In Second IFP/IEEE International Conference on Management of Multimedia Networks and Services, Versailles, November 1998.
-
Richards, A., Rogers, Witana, G., V., and Antoniades, M. Mapping User Level QoS from a Single Parameter. In Second IFP/IEEE International Conference on Management of Multimedia Networks and Services, Versailles, November 1998.
-
-
-
-
33
-
-
0037984544
-
-
RFC 3261, June
-
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and Schooler, E. SIP: Session Initiation Protocol. RFC 3261, June 2002.
-
(2002)
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
34
-
-
34547460554
-
-
Seamons, K. E., Winslett, M., Yu, T., Yu, L., and Jarvis, R. Protecting Privacy during On-line Trust Negotiation. 2nd Workshop on Privacy Enhancing Technologies, San Francisco, CA, April 2002.
-
Seamons, K. E., Winslett, M., Yu, T., Yu, L., and Jarvis, R. Protecting Privacy during On-line Trust Negotiation. 2nd Workshop on Privacy Enhancing Technologies, San Francisco, CA, April 2002.
-
-
-
-
35
-
-
34547432032
-
Improving Quality of Experience for Multimedia Services by QoS Arbitration on a QoE Framework
-
28-29 April, Nantes, France
-
Siller, M. and Woods, JC, Improving Quality of Experience for Multimedia Services by QoS Arbitration on a QoE Framework. International Conference on Packet Video, 28-29 April 2003, Nantes, France
-
(2003)
International Conference on Packet Video
-
-
Siller, M.1
Woods, J.C.2
-
36
-
-
2642567419
-
PPNP: A Privacy Profile Negotiation Protocol for Services in Public Spaces
-
Conference
-
Tamaru, S., Nakazawa, J., Takashio, K., Tokuda, H. PPNP: A Privacy Profile Negotiation Protocol for Services in Public Spaces. First International Workshop on Ubiquitous Systems for Supporting Social Interaction and Face-to-Face Communication in Public Spaces at the Ubicomp 2003 Conference.
-
(2003)
First International Workshop on Ubiquitous Systems for Supporting Social Interaction and Face-to-Face Communication in Public Spaces at the Ubicomp
-
-
Tamaru, S.1
Nakazawa, J.2
Takashio, K.3
Tokuda, H.4
-
37
-
-
78649832628
-
-
Yee, G., Korba, L. Bilateral E-services Negotiation Under Uncertainty. In proceedings, the 2003 International Symposium on Applications and the Internet (SAINT2003), Orlando, Florida, Jan. 27-31, 2003.
-
Yee, G., Korba, L. Bilateral E-services Negotiation Under Uncertainty. In proceedings, the 2003 International Symposium on Applications and the Internet (SAINT2003), Orlando, Florida, Jan. 27-31, 2003.
-
-
-
-
39
-
-
34547476569
-
-
Zhang, D. M. and Wong, W. Y. A Web-Based Negotiation Agent Using CBR. PRICAI Workshops 2000, pp. 183-198.
-
Zhang, D. M. and Wong, W. Y. A Web-Based Negotiation Agent Using CBR. PRICAI Workshops 2000, pp. 183-198.
-
-
-
|