-
1
-
-
80255132548
-
-
Microsoft Security Bulletin MS01-017: Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard: Last Access
-
http://www. microsoft. com/technet/security/bulletin/MS01-017. mspx: Microsoft Security Bulletin MS01-017: Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard: Last Access: 2009.
-
(2009)
-
-
-
4
-
-
33745906823
-
The application of model checking for securing e-commerce transactions
-
Anderson, B. B., Hansen, J. V., Lowry, P. B., & Summers, S. L. (2006). The application of model checking for securing e-commerce transactions. Communications of the ACM, 49, 97-101.
-
(2006)
Communications of the ACM
, vol.49
, pp. 97-101
-
-
Anderson, B.B.1
Hansen, J.V.2
Lowry, P.B.3
Summers, S.L.4
-
6
-
-
54249132131
-
A trusted approach to e-commerce
-
W. Jonker and M. Petkovic (Eds.)
-
Antoniou, G., Batten, L., & Parampalli, U. (2008). A trusted approach to e-commerce. In W. Jonker & M. Petkovic (Eds.), SDM 2008 (Vol. 5159, pp. 119-132).
-
(2008)
SDM 2008
, vol.5159
, pp. 119-132
-
-
Antoniou, G.1
Batten, L.2
Parampalli, U.3
-
7
-
-
80255132543
-
A taxonomy of spam and a protection method for enterprise networks
-
Asami, T., Kikuchi, T., Rikitake, K., Nagata, H., Hamai, T., & Hatori, Y. (2002). A taxonomy of spam and a protection method for enterprise networks. In Information networking: wireless communications technologies and network applications (pp. 442-452).
-
(2002)
Information Networking: Wireless Communications Technologies and Network Applications
, pp. 442-452
-
-
Asami, T.1
Kikuchi, T.2
Rikitake, K.3
Nagata, H.4
Hamai, T.5
Hatori, Y.6
-
8
-
-
47249138639
-
Enabling privacy-preserving e-payment processing
-
Ashrafi, M. Z., & Ng, S. K. (2008). Enabling privacy-preserving e-payment processing. In Lecture notes in computer science (vol. 4947, p. 596).
-
(2008)
Lecture Notes in Computer Science
, vol.4947
, pp. 596
-
-
Ashrafi, M.Z.1
Ng, S.K.2
-
9
-
-
56049097678
-
Privacy-preserving e-payments using one-time payment details
-
Ashrafi, M. Z., & Ng, S. K. (2009). Privacy-preserving e-payments using one-time payment details. Computer Standards & Interfaces, 31, 321-328.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 321-328
-
-
Ashrafi, M.Z.1
Ng, S.K.2
-
11
-
-
16444368611
-
Privacy in e-commerce: stated preferences vs. actual behavior
-
Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48, 101-106.
-
(2005)
Communications of the ACM
, vol.48
, pp. 101-106
-
-
Berendt, B.1
Günther, O.2
Spiekermann, S.3
-
13
-
-
84979809728
-
The EU data protection directive: an engine of a global regime
-
Birnhack, M. D. (2008). The EU data protection directive: an engine of a global regime. Computer Law & Security Report, 24, 508-520.
-
(2008)
Computer Law & Security Report
, vol.24
, pp. 508-520
-
-
Birnhack, M.D.1
-
14
-
-
35248884880
-
Fault based cryptanalysis of the advanced encryption standard (AES)
-
Blomer, J., & Seifert, J. P. (2003). Fault based cryptanalysis of the advanced encryption standard (AES). In Lecture notes in computer science (pp. 162-181).
-
(2003)
Lecture Notes in Computer Science
, pp. 162-181
-
-
Blomer, J.1
Seifert, J.P.2
-
16
-
-
77953603480
-
Privacy and identity management for everyone
-
New York: ACM
-
Camenisch, J., Shelat, A., Sommer, D., Fischer-Hubner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., & Tseng, J. (2005). Privacy and identity management for everyone. In DIM'05 (pp. 20-27). New York: ACM.
-
(2005)
Dim'05
, pp. 20-27
-
-
Camenisch, J.1
Shelat, A.2
Sommer, D.3
Fischer-Hubner, S.4
Hansen, M.5
Krasemann, H.6
Lacoste, G.7
Leenes, R.8
Tseng, J.9
-
17
-
-
54349120507
-
New e-payment scenarios in an extended version of the traditional model
-
Carbonell, M., Torres, J., Izquierdo, A., & Suarez, D. (2008). New e-payment scenarios in an extended version of the traditional model. In Computational science and its applications-ICCSA 2008 (pp. 514-525).
-
(2008)
Computational Science and Its Applications-ICCSA 2008
, pp. 514-525
-
-
Carbonell, M.1
Torres, J.2
Izquierdo, A.3
Suarez, D.4
-
18
-
-
80255139442
-
-
EU Commission says payment fraud moving to the Internet: Last Access: 02/02/2009
-
http://www. scmagazineus. com/EU-Commission-says-payment-fraud-moving-to-the-internet/article/109505/: EU Commission says payment fraud moving to the Internet: Last Access: 02/02/2009.
-
-
-
-
19
-
-
34547095771
-
The effect of Internet general privacy concern on customer behavior
-
Castañeda, J., & Montoro, F. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7, 117-141.
-
(2007)
Electronic Commerce Research
, vol.7
, pp. 117-141
-
-
Castañeda, J.1
Montoro, F.2
-
21
-
-
34249335376
-
Examining customers' trust in online vendors and their dropout decisions: an empirical study
-
Chau, P. Y. K., Hu, P. J. H., Lee, B. L. P., & Au, A. K. K. (2007). Examining customers' trust in online vendors and their dropout decisions: an empirical study. Electronic Commerce Research and Applications, 6, 171-182.
-
(2007)
Electronic Commerce Research and Applications
, vol.6
, pp. 171-182
-
-
Chau, P.Y.K.1
Hu, P.J.H.2
Lee, B.L.P.3
Au, A.K.K.4
-
23
-
-
48749096299
-
PyFlag-an advanced network forensic framework
-
Cohen, M. I. (2008). PyFlag-an advanced network forensic framework. Digital Investigation, 5, S112-S120.
-
(2008)
Digital Investigation
, vol.5
-
-
Cohen, M.I.1
-
24
-
-
0013243382
-
-
Specification 16
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., & Reagle, J. (2002). The platform for privacy preferences 1. 0 (P3P1. 0). Specification 16.
-
(2002)
The Platform for Privacy Preferences 1. 0 (P3P1. 0)
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
25
-
-
14544285334
-
Keeping data private
-
Doherty, S. (2001). Keeping data private. Network Computing, 12, 83-91.
-
(2001)
Network Computing
, vol.12
, pp. 83-91
-
-
Doherty, S.1
-
26
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., & Yao, A. (1983). On the security of public key protocols. Information Theory, IEEE Transactions on29, 198-208.
-
(1983)
Information Theory, IEEE Transactions on
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
27
-
-
0031502147
-
An examination of the nature of trust in buyer-seller relationships
-
Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. Journal of Marketing, 61, 35-51.
-
(1997)
Journal of Marketing
, vol.61
, pp. 35-51
-
-
Doney, P.M.1
Cannon, J.P.2
-
28
-
-
0003546303
-
-
Available at
-
Ellison, C. M., Frantz, B., Lampson, B., Rivest, R., Thomas, B. M., & Ylonen, T. (1999). Simple public key certificate theory. Available at www. ietf. org/rfc/rfc2693. txt.
-
(1999)
Simple public key certificate theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
30
-
-
80255132544
-
-
Heartland Bleeds Data, Potential Victims Could Number Millions
-
http://www. ecommercetimes. com/story/65918. html: Heartland Bleeds Data, Potential Victims Could Number Millions.
-
-
-
-
31
-
-
20344377170
-
Identity theft: Theft, loss and giveaways
-
Hinde, S. (2005). Identity theft: theft, loss and giveaways. Computer Fraud & Security, 18-20.
-
(2005)
Computer Fraud & Security
, pp. 18-20
-
-
Hinde, S.1
-
32
-
-
0042843517
-
The impact of the USA Patriot Act on collection and analysis of personal information under the Foreign Intelligence Surveillance Act
-
Jaeger, P. T., Bertot, J. C., & McClure, C. R. (2003). The impact of the USA Patriot Act on collection and analysis of personal information under the Foreign Intelligence Surveillance Act. Government Information Quarterly, 20, 295-314.
-
(2003)
Government Information Quarterly
, vol.20
, pp. 295-314
-
-
Jaeger, P.T.1
Bertot, J.C.2
McClure, C.R.3
-
33
-
-
0012354155
-
Electronic payments: where do we go from here
-
Jakobsson, M., Mraihi, D., Tsiounis, Y., & Yung, M. (1999). Electronic payments: where do we go from here. In CQRE (pp. 43-63).
-
(1999)
Cqre
, pp. 43-63
-
-
Jakobsson, M.1
Mraihi, D.2
Tsiounis, Y.3
Yung, M.4
-
34
-
-
0002447342
-
Consumer trust in an Internet store
-
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1, 45-71.
-
(2000)
Information Technology and Management
, vol.1
, pp. 45-71
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Vitale, M.3
-
35
-
-
33646534622
-
Trust, privacy and security in e-business: Requirements and solutions
-
Katsikas, S. K., Lopez, J., & Pernul, G. (2005). Trust, privacy and security in e-business: Requirements and solutions. In Proc. of the 10th panhellenic conference on informatics (PCI'2005) (pp. 548-558).
-
(2005)
Proc. Of the 10th Panhellenic Conference on Informatics (PCI'2005)
, pp. 548-558
-
-
Katsikas, S.K.1
Lopez, J.2
Pernul, G.3
-
36
-
-
27644576745
-
Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce
-
Komiak, S. X., & Benbasat, I. (2004). Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Information Technology and Management, 5, 181-207.
-
(2004)
Information Technology and Management
, vol.5
, pp. 181-207
-
-
Komiak, S.X.1
Benbasat, I.2
-
37
-
-
84951333215
-
An improved e-commerce protocol for fair exchange
-
LNCS, Berlin: Springer
-
Konar, D., & Mazumdar, C. (2006). An improved e-commerce protocol for fair exchange. In LNCS: Vol. 4317. ICDCIT 2006. Berlin: Springer.
-
(2006)
ICDCIT 2006
, vol.4317
-
-
Konar, D.1
Mazumdar, C.2
-
39
-
-
33751061515
-
Risk and restitution: assessing how users establish online trust
-
Lacohee, H., Phippen, A. D., & Furnell, S. M. (2006). Risk and restitution: assessing how users establish online trust. Computers & Security, 25, 486-493.
-
(2006)
Computers & Security
, vol.25
, pp. 486-493
-
-
Lacohee, H.1
Phippen, A.D.2
Furnell, S.M.3
-
41
-
-
35948987170
-
Exploring the reasons for a failure of electronic payment systems: a case study of an Australian company
-
Lim, B., Lee, H., & Kurnia, S. (2007). Exploring the reasons for a failure of electronic payment systems: a case study of an Australian company. Journal of Research and Practice in Information Technology, 39, 231-243.
-
(2007)
Journal of Research and Practice in Information Technology
, vol.39
, pp. 231-243
-
-
Lim, B.1
Lee, H.2
Kurnia, S.3
-
43
-
-
33745620045
-
A counting-based method for massive spam mail classification
-
Luo, H., Fang, B., & Yun, X. (2006). A counting-based method for massive spam mail classification. Lecture Notes in Computer Science (vol. 3903, p. 45).
-
(2006)
Lecture Notes in Computer Science
, vol.3903
, pp. 45
-
-
Luo, H.1
Fang, B.2
Yun, X.3
-
45
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
-
Mary, J. C., & Pamela, K. A. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10, 104-115.
-
(1999)
Organization Science
, vol.10
, pp. 104-115
-
-
Mary, J.C.1
Pamela, K.A.2
-
46
-
-
80255132541
-
-
Hackers attack forensics tools: Last Access: 02/02/2009
-
http://www. securecomputing. net. au/News/126871, hackers-attack-forensics-tools. aspx: Hackers attack forensics tools: Last Access: 02/02/2009.
-
-
-
-
47
-
-
80255127164
-
-
Look out for fraudulent Microsoft digital certificates
-
McCormick, J. (2009). Look out for fraudulent Microsoft digital certificates.
-
(2009)
-
-
McCormick, J.1
-
48
-
-
0036737236
-
Developing and validating trust measures for e-commerce: an integrative typology
-
McKnight, D. H., Choudhury, V., & Kacmar, C. (2003). Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research, 13, 334-359.
-
(2003)
Information Systems Research
, vol.13
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
50
-
-
0035587412
-
Consumer perceptions of privacy and security risks for online shopping
-
Miyazaki, A. D., & Fernandez, A. N. A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35, 27-44.
-
(2001)
Journal of Consumer Affairs
, vol.35
, pp. 27-44
-
-
Miyazaki, A.D.1
Fernandez, A.N.A.2
-
51
-
-
38549176080
-
Dynamic virtual credit card numbers
-
LNCS, S. Dietrich and R. Dhamija (Eds.), Berlin: Springer
-
Molloy, I., Li, J., & Li, N. (2007). Dynamic virtual credit card numbers. In S. Dietrich & R. Dhamija (Eds.), LNCS: Vol. 4886. FC 2007 and USEC 2007 (pp. 208-223). Berlin: Springer.
-
(2007)
FC 2007 and USEC 2007
, vol.4886
, pp. 208-223
-
-
Molloy, I.1
Li, J.2
Li, N.3
-
52
-
-
14544301547
-
Do consumers understand the role of privacy seals in e-commerce?
-
Moores, T. (2005). Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM, 48, 86-91.
-
(2005)
Communications of the ACM
, vol.48
, pp. 86-91
-
-
Moores, T.1
-
53
-
-
80255132542
-
-
Credit Card Firms Wail, Gnash Teeth Over New Consumer-Friendly Rules: Last Access: 02/02/2009.
-
http://www. ecommercetimes. com/story/65568. html: Credit Card Firms Wail, Gnash Teeth Over New Consumer-Friendly Rules: Last Access: 02/02/2009.
-
-
-
-
54
-
-
33750948989
-
Exploring the impact of online privacy disclosures on consumer trust
-
Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82, 331-338.
-
(2006)
Journal of Retailing
, vol.82
, pp. 331-338
-
-
Pan, Y.1
Zinkhan, G.M.2
-
55
-
-
80255139438
-
Electronic commerce
-
Rajaraman, V. (2001). Electronic commerce. Resonance, 6, 6-13.
-
(2001)
Resonance
, vol.6
, pp. 6-13
-
-
Rajaraman, V.1
-
56
-
-
1142294445
-
Fair exchange in e-commerce
-
Ray, I. (2002). Fair exchange in e-commerce. ACM SIGecom Exchanges, 3, 9-17.
-
(2002)
ACM SIGecom Exchanges
, vol.3
, pp. 9-17
-
-
Ray, I.1
-
57
-
-
44149099072
-
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components
-
Ray, I., & Zhang, H. (2008). Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electronic Commerce Research and Applications, 7, 247-259.
-
(2008)
Electronic Commerce Research and Applications
, vol.7
, pp. 247-259
-
-
Ray, I.1
Zhang, H.2
-
59
-
-
80255134910
-
-
Applied Cryptography
-
Schneier, B. (1995) Blowfish. Applied Cryptography 336-339.
-
(1995)
Blowfish
, pp. 336-339
-
-
Schneier, B.1
-
61
-
-
0037402796
-
Privacy-enhancing technologies-approaches and development
-
Senicar, V., Jerman-Blažic, B., & Klobucar, T. (2003). Privacy-enhancing technologies-approaches and development. Computer Standards & Interfaces, 25, 147-158.
-
(2003)
Computer Standards & Interfaces
, vol.25
, pp. 147-158
-
-
Senicar, V.1
Jerman-Blažic, B.2
Klobucar, T.3
-
62
-
-
85024259531
-
The influence of information sensitivity compensation on privacy concern and behavioral intention
-
Shu, Y., & Kanliang, W. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. SIGMIS Database, 40, 38-51.
-
(2009)
SIGMIS Database
, vol.40
, pp. 38-51
-
-
Shu, Y.1
Kanliang, W.2
-
66
-
-
33748200634
-
Consumer trust in e-commerce in the United States, Singapore and China
-
Teo, T. S. H., & Liu, J. (2007). Consumer trust in e-commerce in the United States, Singapore and China. Omega, 35, 22-38.
-
(2007)
Omega
, vol.35
, pp. 22-38
-
-
Teo, T.S.H.1
Liu, J.2
-
67
-
-
67649223726
-
The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce
-
Thomas, P. V. D., Vishal, M., & Hamid, N. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17, 68-81.
-
(2007)
Electronic Markets
, vol.17
, pp. 68-81
-
-
Thomas, P.V.D.1
Vishal, M.2
Hamid, N.3
-
68
-
-
80255132537
-
Digital payment systems for Internet commerce: the state of the art
-
Ureche, O., & Plamondon, R. (2000). Digital payment systems for Internet commerce: the state of the art. World Wide Web, 3, 1-11.
-
(2000)
World Wide Web
, vol.3
, pp. 1-11
-
-
Ureche, O.1
Plamondon, R.2
-
69
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
Viganò, L. (2006). Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science, 155, 61-86.
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.155
, pp. 61-86
-
-
Viganò, L.1
-
70
-
-
34548129920
-
An open source forensic tool to visualize digital evidence
-
Vlastos, E., & Patel, A. (2007). An open source forensic tool to visualize digital evidence. Computer Standards & Interfaces, 29, 614-625.
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 614-625
-
-
Vlastos, E.1
Patel, A.2
|