-
2
-
-
19944376495
-
Information assurance for security protocols
-
Elsevier
-
Bella G., and Bistarelli S. Information assurance for security protocols. Computers and Security 24 (2004) 322-333 Elsevier
-
(2004)
Computers and Security
, vol.24
, pp. 322-333
-
-
Bella, G.1
Bistarelli, S.2
-
3
-
-
35048902051
-
Simulation model for the estimation of timeouts in non-repudiation protocols
-
ICCSA Workshop on Internet Communications Security, May
-
Carbonell M, Onieva J, Lopez J, Zhou J, Galpert D. Simulation model for the estimation of timeouts in non-repudiation protocols. In: ICCSA Workshop on Internet Communications Security, LNCS 3043, May 2004. p. 903-14.
-
(2004)
LNCS
, vol.3043
, pp. 903-914
-
-
Carbonell, M.1
Onieva, J.2
Lopez, J.3
Zhou, J.4
Galpert, D.5
-
4
-
-
3042857070
-
An English auction scheme in the online transaction environment
-
Elsevier
-
Chen T. An English auction scheme in the online transaction environment. Computers and Security 23 (2004) 389-399 Elsevier
-
(2004)
Computers and Security
, vol.23
, pp. 389-399
-
-
Chen, T.1
-
5
-
-
33846371427
-
Insider attacks on multi-proxy multi-signature schemes
-
Gou L., and Wang G. Insider attacks on multi-proxy multi-signature schemes. Computers and Electrical Engineering 33 2 (2007) 88-93
-
(2007)
Computers and Electrical Engineering
, vol.33
, Issue.2
, pp. 88-93
-
-
Gou, L.1
Wang, G.2
-
9
-
-
67349182768
-
Towards a web services and intelligent agents-based negotiation system for B2B eCommerce
-
[accessed 14.07.06]
-
Lau R. Towards a web services and intelligent agents-based negotiation system for B2B eCommerce. Electronic Commerce Research and Applications 14 (2006) [accessed 14.07.06]
-
(2006)
Electronic Commerce Research and Applications
, vol.14
-
-
Lau, R.1
-
11
-
-
33645518903
-
On automated e-business negotiations: goal, policy, strategy, and plans of decision and action
-
Li H., Su S., and Lam H. On automated e-business negotiations: goal, policy, strategy, and plans of decision and action. Journal of Organizational Computing and Electronic Commerce 16 1 (2006) 1-29
-
(2006)
Journal of Organizational Computing and Electronic Commerce
, vol.16
, Issue.1
, pp. 1-29
-
-
Li, H.1
Su, S.2
Lam, H.3
-
12
-
-
0038241111
-
Generalization of proxy signature-based on discrete logarithms
-
Lia L., Tzenga S., and Hwang M. Generalization of proxy signature-based on discrete logarithms. Computers and Security 22 3 (2003) 245-255
-
(2003)
Computers and Security
, vol.22
, Issue.3
, pp. 245-255
-
-
Lia, L.1
Tzenga, S.2
Hwang, M.3
-
14
-
-
33750322392
-
Integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders
-
Lin F., and Lin Y. Integrating multi-agent negotiation to resolve constraints in fulfilling supply chain orders. Electronic Commerce Research and Applications 5 4 (2006) 313-322
-
(2006)
Electronic Commerce Research and Applications
, vol.5
, Issue.4
, pp. 313-322
-
-
Lin, F.1
Lin, Y.2
-
15
-
-
0142218973
-
Practical service charge for P2P content distribution
-
Springer, Huhehaote, China. 3-540-20150-5
-
Onieva J., Zhou J., and Lopez J. Practical service charge for P2P content distribution. International conference on information and communications security, LNCS 2836 (2003), Springer, Huhehaote, China. 3-540-20150-5 112-123
-
(2003)
International conference on information and communications security, LNCS 2836
, pp. 112-123
-
-
Onieva, J.1
Zhou, J.2
Lopez, J.3
-
18
-
-
1842528329
-
The utility business model and the future of computing services
-
Rappa M. The utility business model and the future of computing services. IBM Systems Journal 43 1 (2004). http://digitalenterprise.org/models/models.html
-
(2004)
IBM Systems Journal
, vol.43
, Issue.1
-
-
Rappa, M.1
-
19
-
-
67349241807
-
An efficient multiple merchants payment protocol for secure electronic transaction based on purchase consolidation" ISEC 2001
-
Springer-Verlag, Berlin Heidelberg
-
Sans O., and Agnew G. An efficient multiple merchants payment protocol for secure electronic transaction based on purchase consolidation" ISEC 2001. LNCS 2040 (2001), Springer-Verlag, Berlin Heidelberg 1-19
-
(2001)
LNCS
, vol.2040
, pp. 1-19
-
-
Sans, O.1
Agnew, G.2
-
20
-
-
34249323788
-
Buyer agent to enhance consumer awareness: SAATHI
-
Sen S., Saha S., and Hernandez K. Buyer agent to enhance consumer awareness: SAATHI. Electronic Commerce Research and Applications, Summer 6 2 (2007) 209-218
-
(2007)
Electronic Commerce Research and Applications, Summer
, vol.6
, Issue.2
, pp. 209-218
-
-
Sen, S.1
Saha, S.2
Hernandez, K.3
-
21
-
-
47849088421
-
An anonymous account-based mobile payment protocol for a restricted connectivity scenario2
-
Téllez J, Sierra J. An anonymous account-based mobile payment protocol for a restricted connectivity scenario2. In: DEXA workshops 2007; 2007. p. 688-92.
-
(2007)
DEXA workshops
, pp. 688-692
-
-
Téllez, J.1
Sierra, J.2
-
23
-
-
15744371890
-
The concept of security and trust in electronic payments
-
Tsiakis T., and Sthephanides G. The concept of security and trust in electronic payments. Computers and Security 24 1 (2005) 10-15
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 10-15
-
-
Tsiakis, T.1
Sthephanides, G.2
-
26
-
-
3342889024
-
PumaMart: a parallel and autonomous agents based internet marketplace
-
Wang Y., Tan K., and Ren J. PumaMart: a parallel and autonomous agents based internet marketplace. Electronic Commerce Research and Applications 3 3 (2004) 294-310
-
(2004)
Electronic Commerce Research and Applications
, vol.3
, Issue.3
, pp. 294-310
-
-
Wang, Y.1
Tan, K.2
Ren, J.3
-
27
-
-
34648857541
-
Hybrid proxy multisignature: a new type multi-party signature
-
Wang Z., Qian H., and Li Z. Hybrid proxy multisignature: a new type multi-party signature. Information Sciences 177 24 (2007) 5638-5650
-
(2007)
Information Sciences
, vol.177
, Issue.24
, pp. 5638-5650
-
-
Wang, Z.1
Qian, H.2
Li, Z.3
-
29
-
-
67349164939
-
An efficient anonymous proxy signature scheme with provable security
-
[accessed 17.05.08]
-
Yu Y., Xu C., Huang X., and Mu Y. An efficient anonymous proxy signature scheme with provable security. Computer Standards and Interfaces 17 (2008) [accessed 17.05.08]
-
(2008)
Computer Standards and Interfaces
, vol.17
-
-
Yu, Y.1
Xu, C.2
Huang, X.3
Mu, Y.4
|