-
1
-
-
34547431237
-
A. Verifiable digital object identity system
-
AND HUTCHISON, K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds, ACM
-
ARNAB, A., AND HUTCHISON, A. Verifiable digital object identity system. In Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006, Alexandria, Virginia, USA (2006), K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds., ACM.
-
(2006)
Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006, Alexandria, Virginia, USA
-
-
ARNAB, A.1
-
2
-
-
33646828462
-
S. Authentication in e-commerce
-
AND MUYLLE, url
-
BASU, A., AND MUYLLE, S. Authentication in e-commerce. Communications of the ACM 46, 12(2003), 159-166. url: http://doi.acm.org/lO.l145/953460.953496.
-
(2003)
Communications of the ACM
, vol.46
, Issue.12
, pp. 159-166
-
-
BASU, A.1
-
3
-
-
0038011251
-
The verification of an industrial payment protocol: The set purchase phase
-
New York, NY, USA, ACM Press, pp, url
-
BELLA, G., PAULSON, L. C, AND MASSACCI, F. The verification of an industrial payment protocol: The set purchase phase. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security (New York, NY, USA, 2002), ACM Press, pp. 12-20. url: http://doi.acm.org/lO.1145/586110.586113.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 12-20
-
-
BELLA, G.1
PAULSON, L.C.2
MASSACCI, F.3
-
4
-
-
11144292628
-
-
MULLIGAN, D., HAN, J., AND BURSTEIN, A. How DRM Based Content Delivery Systems Disrupt Expectations of Personal Use. In Proceedings of the 2003 ACM workshop on Digital Rights Management (2003), ACM, pp. 77-89. URL: http://doi.acm.org/lO.1145/947380.947391.
-
MULLIGAN, D., HAN, J., AND BURSTEIN, A. How DRM Based Content Delivery Systems Disrupt Expectations of "Personal Use". In Proceedings of the 2003 ACM workshop on Digital Rights Management (2003), ACM, pp. 77-89. URL: http://doi.acm.org/lO.1145/947380.947391.
-
-
-
-
5
-
-
1142268198
-
M. Paycash: A secure efficient internet payment system
-
New York, NY, USA, ACM Press, pp, url
-
PEHA, J. M., AND KHAMITOV, I. M. Paycash: A secure efficient internet payment system. In ICEC '03: Proceedings of the 5th international conference on Electronic commerce (New York, NY, USA, 2003), ACM Press, pp. 125-130. url: http://doi.acm.org/lO.1145/ 948005.948022.
-
(2003)
ICEC '03: Proceedings of the 5th international conference on Electronic commerce
, pp. 125-130
-
-
PEHA, J.M.1
KHAMITOV, I.2
-
6
-
-
36248987205
-
-
ROBERTS, P. Strong authentication a hard sell for banks. ComputerWorld (02 Nov 2004). URL: http://www.computerworld.com/action/ article.do?command=viewArticleBasic&articleId=97133 Last accessed: 05 Aug 2006.
-
ROBERTS, P. Strong authentication a hard sell for banks. ComputerWorld (02 Nov 2004). URL: http://www.computerworld.com/action/ article.do?command=viewArticleBasic&articleId=97133 Last accessed: 05 Aug 2006.
-
-
-
-
7
-
-
36249000580
-
-
ROSENCRANCE, L. Gartner survey sparks debate on internet retail fraud. ComputerWorld (18 July 2000). URL: http://www.computerworld.com/action/ article.do?command=viewArticleBasic&articleId=47270 Last accessed: 05 Aug 2006.
-
ROSENCRANCE, L. Gartner survey sparks debate on internet retail fraud. ComputerWorld (18 July 2000). URL: http://www.computerworld.com/action/ article.do?command=viewArticleBasic&articleId=47270 Last accessed: 05 Aug 2006.
-
-
-
-
8
-
-
33751066171
-
Analysis of the set e-commerce protocol using a true concurrency process algebra
-
New York, NY, USA, ACM Press, pp, url
-
RUIZ, M. C, CAZORLA, D., CUARTERO, R, AND PARDO, J. J. Analysis of the set e-commerce protocol using a true concurrency process algebra. In SAC '06: Proceedings of the 2006 ACM symposium on Applied computing (New York, NY, USA, 2006), ACM Press, pp. 879-886. url: http://doi.acm.org/10.1145/1141277.1141480.
-
(2006)
SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
, pp. 879-886
-
-
RUIZ, M.C.1
CAZORLA, D.2
CUARTERO, R.3
PARDO, J.J.4
-
10
-
-
0039101918
-
S. Trust and traceability in electronic commerce
-
AND RASBERRY, url
-
STEINAUER, D. D., WAKID, S. A., AND RASBERRY, S. Trust and traceability in electronic commerce. StandardView 5, 3 (1997), 118-124. url: http://doi.acm.org/lO.1145/266231.266239.
-
(1997)
StandardView
, vol.5
, Issue.3
, pp. 118-124
-
-
STEINAUER, D.D.1
WAKID, S.A.2
-
11
-
-
34547447836
-
Vicarious infringement creates a privacy ceiling
-
K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds, ACM
-
TSAI, J. Y, CRANOR, L. F., AND CRAVER, S. Vicarious infringement creates a privacy ceiling. In Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006, Alexandria, Virginia, USA (2006), K. Kurosawa, R. Safavi-Naini, and M. Yung, Eds., ACM.
-
(2006)
Proceedings of the Sixth ACM Workshop on Digital Rights Management, Co-Located with ACM CCS 2006, Alexandria, Virginia, USA
-
-
TSAI, J.Y.1
CRANOR, L.F.2
CRAVER, S.3
|