-
1
-
-
0003293531
-
Free riding on Gnutella
-
E. Adar and B. Huberman. Free riding on Gnutella. First Monday, Vol.5, no. 10, 2000.
-
(2000)
First Monday
, vol.5
, Issue.10
-
-
Adar, E.1
Huberman, B.2
-
3
-
-
84877628849
-
-
On-line at
-
Apple iTunes. On-line at: http://www.apple.com/itunes.
-
Apple iTunes
-
-
-
4
-
-
34547643405
-
-
au LISTEN MOBILE SERVICE. On-line at
-
au LISTEN MOBILE SERVICE. On-line at: http://www.kddi.com/lismo.
-
-
-
-
5
-
-
34547622868
-
-
Axalto Inc. On-line at
-
Axalto Inc. On-line at: http://www.axalto.com/index.asp.
-
-
-
-
7
-
-
34547614826
-
-
Bluetooth SIG. On-line at
-
Bluetooth SIG. On-line at: http://www.bluetooth.com/bluetooth.
-
-
-
-
11
-
-
34547620543
-
-
T. Dierksa and C. Allen. The TLS Protocol Version 1.0. Internet draft, 1999. On-line at
-
T. Dierksa and C. Allen. The TLS Protocol Version 1.0. Internet draft, 1999. On-line at: http://ietf.org/rfc/rfc2246.txt.
-
-
-
-
12
-
-
34547635830
-
-
S. Fanning and S. Parker. Napster. June, 1999.
-
S. Fanning and S. Parker. Napster. June, 1999.
-
-
-
-
13
-
-
0003584029
-
-
Federal Information Processing Standards, Publication FIPS PUB
-
Federal Information Processing Standards. Security Requirements for Cryptographic Modules. Publication FIPS PUB 140-2, 2002.
-
(2002)
Security Requirements for Cryptographic Modules
, pp. 140-142
-
-
-
14
-
-
77955614898
-
-
Federal Information Processing Standards, standard. Publication FIPS 180-2
-
Federal Information Processing Standards. Specifications for the secure hash standard. Publication FIPS 180-2. 2002.
-
(2002)
Specifications for the secure hash
-
-
-
15
-
-
3242802867
-
Robust Incentive Techniques for Peer-to-Peer Networks
-
M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust Incentive Techniques for Peer-to-Peer Networks. ACM Electronic Commerce, pp.102-11, 2004.
-
(2004)
ACM Electronic Commerce
, pp. 102-111
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
16
-
-
34547619257
-
-
A.O. Freier, P. Karlton, and P.C. Kocher. The SSL Protocol Version 3.0. Internet draft, 1996. On-line at
-
A.O. Freier, P. Karlton, and P.C. Kocher. The SSL Protocol Version 3.0. Internet draft, 1996. On-line at: http://www.netscape.com/eng/ssl3/draft302.txt.
-
-
-
-
17
-
-
34547618838
-
-
Gemplus Inc. On-line at
-
Gemplus Inc. On-line at: http://www.gemplus.com/smart/rd/publications.
-
-
-
-
18
-
-
84949478858
-
Incentives for sharing in peer-to-peer networks
-
P. Golle, K. Leyton-Brown, I. Mironov, and M. Lillibridge. Incentives for sharing in peer-to-peer networks. ACM Electronic Commerce, pp.75-87, 2001.
-
(2001)
ACM Electronic Commerce
, pp. 75-87
-
-
Golle, P.1
Leyton-Brown, K.2
Mironov, I.3
Lillibridge, M.4
-
21
-
-
34547615022
-
-
IFPI. IFPL06 Digital Music Report. On-line at: http://www.ifpi.org/site- content/library/ digital-music-report-2006.pdf.
-
IFPI. IFPL06 Digital Music Report. On-line at: http://www.ifpi.org/site- content/library/ digital-music-report-2006.pdf.
-
-
-
-
22
-
-
34547627865
-
-
Infineon Technologies AG. On-line at
-
Infineon Technologies AG. On-line at: http://www.infineon.com.
-
-
-
-
23
-
-
34547616855
-
-
JSR.-000082 Java™ APIs for Bluetooth (Final Release). On-line at: http://jcp.org/aboutJava/ communityprocess/final/jsr082.
-
JSR.-000082 Java™ APIs for Bluetooth (Final Release). On-line at: http://jcp.org/aboutJava/ communityprocess/final/jsr082.
-
-
-
-
24
-
-
0012996799
-
What exactly is viral marketing?
-
S. Jurvetson. What exactly is viral marketing? Red Herring, Vol.78, pp.110-112, 2000.
-
(2000)
Red Herring
, vol.78
, pp. 110-112
-
-
Jurvetson, S.1
-
26
-
-
33645320527
-
Using ubiquitous computing in interactive mobile marketing
-
S. Kurkovsky, K. Harihar. Using ubiquitous computing in interactive mobile marketing. Personal Ubiquitous Comput. Vol.10, no.4, pp. 227-240, 2006.
-
(2006)
Personal Ubiquitous Comput
, vol.10
, Issue.4
, pp. 227-240
-
-
Kurkovsky, S.1
Harihar, K.2
-
27
-
-
34547643776
-
-
LTDnetwork, Inc, On-line at
-
LTDnetwork, Inc. QTrax. On-line at: http://www.qtrax.com/.
-
QTrax
-
-
-
28
-
-
34547632930
-
-
On-line at
-
Mashboxx. On-line at: http://www.mashboxx.com.
-
Mashboxx
-
-
-
29
-
-
34547646722
-
-
Microsoft Windows DRM. On-line at
-
Microsoft Windows DRM. On-line at: http://www.microsoft.com/windows/ windowsmedia/drm.
-
-
-
-
30
-
-
34547613738
-
-
nCipher Technologies Inc. On-line at
-
nCipher Technologies Inc. On-line at: http://www.ncipher.com/ technologies.
-
-
-
-
34
-
-
34547628067
-
-
University Of Auckland, Department of Management Science and Information Systems, working paper, 2005
-
J. Paynter and P. Law. An arm's length evaluation of Octopus. University Of Auckland, Department of Management Science and Information Systems, working paper, 2005.
-
An arm's length evaluation of Octopus
-
-
Paynter, J.1
Law, P.2
-
36
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
37
-
-
34547624345
-
-
SafeNet Inc. On-line at
-
SafeNet Inc. On-line at: http://www.safenet-inc.com/products/tokens/ products_sc_330.asp.
-
-
-
-
39
-
-
34547641071
-
-
Weedshare Inc. On-line at
-
Weedshare Inc. On-line at: http://www.weedshare.com.
-
-
-
-
40
-
-
34547634042
-
-
Windows Embedded Source Tools for Bluetooth Technology. On-line at: http://msdn.microsoft.com/ embedded/usewinemb/ce/sharedsrccode/west/.
-
Windows Embedded Source Tools for Bluetooth Technology. On-line at: http://msdn.microsoft.com/ embedded/usewinemb/ce/sharedsrccode/west/.
-
-
-
-
41
-
-
34547644116
-
-
Wurld Media, Inc, On-line at
-
Wurld Media, Inc. Peerlmpact. On-line at: http://www.peerimpact.com.
-
Peerlmpact
-
-
-
42
-
-
4544301282
-
A Dynamic Pricing Mechanism for P2P Referral Systems
-
B. Yu, C. Li, M.P. Singh, and K. Sycara. A Dynamic Pricing Mechanism for P2P Referral Systems. International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp.1426-27, 2004.
-
(2004)
International Joint Conference on Autonomous Agents and Multi-Agent Systems
, pp. 1426-1427
-
-
Yu, B.1
Li, C.2
Singh, M.P.3
Sycara, K.4
|