-
1
-
-
84870415304
-
-
libwww-perl, Online:
-
Aas, G. (2010). libwww-perl, Online: http://search.cpan.org/dist/libwww-perl/.
-
(2010)
-
-
Aas, G.1
-
2
-
-
33644758952
-
-
Online
-
AccountingWEB. (2000). Is Your Web Site Too Big?, Online: http://www.accountingweb.com/item/29331.
-
(2000)
Is Your Web Site Too Big?
-
-
-
4
-
-
0033705621
-
Integrating User-perceived Quality into Web Server Design
-
Bhatti, N., Bouch, A., and Kuchinsky, A. (2000). Integrating User-perceived Quality into Web Server Design, Computer Networks (Amsterdam, Netherlands: 1999) 33, 1-16.
-
(2000)
Computer Networks (Amsterdam, Netherlands: 1999)
, vol.33
, pp. 1-16
-
-
Bhatti, N.1
Bouch, A.2
Kuchinsky, A.3
-
5
-
-
49049114397
-
The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies
-
Dinev, T. and Hu, Q. (2007). The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies, Journal of the Association for Information Systems, 8, 7, 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
7
-
-
33846576633
-
On the Impact of Security on Latency in WLAN 802.11b
-
3
-
Fathi, H., Kobara, K., Chakraborty, S. S., Imai, H., and Prasad, R. (2005). On the Impact of Security on Latency in WLAN 802.11b, Proceedings of the IEEE Global Telecommunications Conference, 3.
-
(2005)
Proceedings of the IEEE Global Telecommunications Conference
-
-
Fathi, H.1
Kobara, K.2
Chakraborty, S.S.3
Imai, H.4
Prasad, R.5
-
8
-
-
13944270149
-
Web Site Delays: How Tolerant are Users?
-
Online
-
Galletta, D.F., Henry, R., McCoy, S. and Polak, P. (2004). Web Site Delays: How Tolerant are Users?, Journal of the Association for Information Systems 5, Online: http://aisel.aisnet.org/jais/vol5/iss1/1.
-
(2004)
Journal of the Association for Information Systems
, vol.5
-
-
Galletta, D.F.1
Henry, R.2
McCoy, S.3
Polak, P.4
-
9
-
-
84878363071
-
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
-
Online
-
Loesing, K., Murdoch, S.J., and Dingledine, R. (2009). A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010), Online: http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf.
-
(2009)
Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)
-
-
Loesing, K.1
Murdoch, S.J.2
Dingledine, R.3
-
10
-
-
77955329300
-
Measuring the Tor Network from Public Directory Information
-
Online
-
Loesing, K. (2009). Measuring the Tor Network from Public Directory Information, 2nd Hot Topics in Privacy Enhancing Technologies (HotPETs), Online: http://www.freehaven.net/~karsten/metrics/measuring-tor-public-dir-infofinal. pdf.
-
(2009)
2nd Hot Topics in Privacy Enhancing Technologies (HotPETs)
-
-
Loesing, K.1
-
11
-
-
0034510013
-
Firewall Security: Policies, Testing and Performance Evaluation
-
Lyu, M.R. and Lau, L.K.Y. (2000). Firewall Security: Policies, Testing and Performance Evaluation, COMPSAC, 116-121.
-
(2000)
COMPSAC
, pp. 116-121
-
-
Lyu, M.R.1
Lau, L.K.Y.2
-
13
-
-
2442593911
-
A study on Tolerable Waiting Time: How Long are Web Users Willing to Wait?
-
Nah, F. F. (2004). A study on Tolerable Waiting Time: How Long are Web Users Willing to Wait?, Behaviour & Information Technology, 23, 3, 153-163.
-
(2004)
Behaviour & Information Technology
, vol.23
, Issue.3
, pp. 153-163
-
-
Nah, F.F.1
-
14
-
-
0003824749
-
-
Revisited Three Years Later (Alertbox May 1999), Online
-
Nielson, J. (1999). "Top Ten Mistakes" Revisited Three Years Later (Alertbox May 1999), Online: http://www.useit.com/alertbox/990502.html.
-
(1999)
Top Ten Mistakes
-
-
Nielson, J.1
-
16
-
-
84870444494
-
-
Privoxy Home Page, Online: http://www.privoxy.org/
-
Privoxy (2010). Privoxy Home Page, Online: http://www.privoxy.org/.
-
(2010)
-
-
Privoxy1
-
17
-
-
0032026632
-
A Psychological Investigation of Long Retrieval Times on the World Wide Web
-
Ramsay, J., Barbesi, A., and Preece, J. (1998). A Psychological Investigation of Long Retrieval Times on the World Wide Web, Interacting with Computers, 10, 77-86.
-
(1998)
Interacting with Computers
, vol.10
, pp. 77-86
-
-
Ramsay, J.1
Barbesi, A.2
Preece, J.3
-
18
-
-
0002551409
-
Current Technological Impediments to Business-to-consumer Electronic Commerce
-
Rose, G., Khoo, H., and Straub, D. W. (1999). Current Technological Impediments to Business-to-consumer Electronic Commerce, Communications of the AIS, 1, 5, 1.
-
(1999)
Communications of the AIS
, vol.1
, Issue.5
, pp. 1
-
-
Rose, G.1
Khoo, H.2
Straub, D.W.3
-
20
-
-
34250639076
-
How Long is Too Long to Wait for a Website to Load?
-
Online
-
Selvidge, P. (1999). How Long is Too Long to Wait for a Website to Load?, Usability News, 1, 2, Online: http://www.surl.org/usabilitynews/12/time_delay.asp.
-
(1999)
Usability News
, vol.1
, Issue.2
-
-
Selvidge, P.1
-
21
-
-
0040481708
-
Boo. com-The Path to Failure
-
Stockport, G. J., Kunnath, G., and Sedick, R. (2001). Boo. com-The Path to Failure, Journal of Interactive Marketing, 15, 56-70.
-
(2001)
Journal of Interactive Marketing
, vol.15
, pp. 56-70
-
-
Stockport, G.J.1
Kunnath, G.2
Sedick, R.3
-
22
-
-
84870398362
-
-
Tor: Anonymity Online, Online: http://www.torproject.org/
-
Tor Project. (2010a). Tor: Anonymity Online, Online: http://www.torproject.org/.
-
(2010)
-
-
Project, T.1
-
23
-
-
84870474149
-
-
Tor Metrics Portal, Online: http://metrics.torproject.org/
-
Tor Project. (2010b). Tor Metrics Portal, Online: http://metrics.torproject.org/.
-
(2010)
-
-
Project, T.1
-
24
-
-
84870402268
-
-
Anonymous Networks, Online: http://blag.cerebralmind.net/wp-content/uploads/2008/05/tor.pdf
-
Vitone, D. (2008). Anonymous Networks, Online: http://blag.cerebralmind.net/wp-content/uploads/2008/05/tor.pdf
-
(2008)
-
-
Vitone, D.1
-
25
-
-
35248817413
-
Security, Privacy, and Anonymity
-
Wright, T. (2004). Security, Privacy, and Anonymity, Crossroads, 11, 2, 5.
-
(2004)
Crossroads
, vol.11
, Issue.2
, pp. 5
-
-
Wright, T.1
-
26
-
-
46449092480
-
Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks
-
Zia, T., Zomaya, A., and Ababneh, N. (2007). Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks, Proceedings of the 2007 International Conference on Sensor Technologies and Applications, 181-185.
-
(2007)
Proceedings of the 2007 International Conference on Sensor Technologies and Applications
, pp. 181-185
-
-
Zia, T.1
Zomaya, A.2
Ababneh, N.3
|