default search action
TrustBus 2005: Copenhagen, Denmark
- Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3592, Springer 2005, ISBN 3-540-28224-6 - Hannes Federrath:
Privacy Enhanced Technologies: Methods - Markets - Misuse. 1-9 - Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris:
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. 10-19 - Klaus Plößl, Hannes Federrath, Thomas Nowey:
Protection Mechanisms Against Phishing Attacks. 20-29 - Jordi Castellà-Roca, Francesc Sebé, Josep Domingo-Ferrer:
Dropout-Tolerant TTP-Free Mental Poker. 30-40 - Bumjoo Park, Kiejin Park, Sungsoo Kim:
A Self-healing Mechanism for an Intrusion Tolerance System. 41-49 - Jianshu Weng, Chunyan Miao, Angela Goh:
Protecting Online Rating Systems from Unfair Ratings. 50-59 - Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. 60-69 - Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd:
Designing Secure E-Tendering Systems. 70-79 - Stephan Groß, Sabine Lein, Sandra Steinbrecher:
A Multilateral Secure Payment System for Wireless LAN Hotspots. 80-89 - Junghyun Nam, Seungjoo Kim, Dongho Won:
Secure Group Communications over Combined Wired and Wireless Networks. 90-99 - Oliver Jorns, Oliver Jung, Julia Gross, Sandford Bessler:
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. 100-109 - Heiko Rossnagel, Denis Royer:
Making Money with Mobile Qualified Electronic Signatures. 110-118 - Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey:
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). 119-127 - Hyun-A Park, Jin Wook Byun, Dong Hoon Lee:
Secure Index Search for Groups. 128-140 - Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland:
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. 141-150 - Ching Lin, Vijay Varadharajan, Yan Wang:
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. 151-160 - Elizabeth Chang, Patricia Thomson, Tharam S. Dillon, Farookh Khadeer Hussain:
The Fuzzy and Dynamic Nature of Trust. 161-174 - Lea Viljanen:
Towards an Ontology of Trust. 175-184 - Jianhong Zhang, Jiancheng Zou, Yumin Wang:
An Improved Group Signature Scheme. 185-194 - Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee:
Efficient Member Revocation in Group Signature Schemes. 195-205 - Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Conditional Digital Signatures. 206-215 - Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee:
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. 216-225 - Marco Casassa Mont, Robert Thyne, Pete Bramhall:
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. 226-235 - Marco Casassa Mont, Siani Pearson:
An Adaptive Privacy Management System for Data Repositories. 236-245 - Ayça Azgin Hintoglu, Yücel Saygin, Salima Benbernou, Mohand-Said Hacid:
Privacy Preserving Data Mining Services on the Web. 246-255 - Sylvia Mercado Kierkegaard:
Reading Your Keystroke: Whose Mail Is It? 256-265 - Huafei Zhu, Feng Bao:
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. 266-273 - JungHoon Ha, Jianying Zhou, Sang-Jae Moon:
An Improved Double Auction Protocol Against False Bids. 274-287 - Glenn Bewsell, Rodger Jamieson, Adrian Gardiner, Deborah Bunker:
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions. 288-298 - Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan:
A Secure Fingerprint Authentication System on an Untrusted Computing Environment. 299-310 - Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo:
Security Enhancement for Password Authentication Schemes with Smart Cards. 311-320 - Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti:
Securing Operating System Services Based on Smart Cards. 321-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.