A Trusted Approach to E-Commerce
暂无分享,去创建一个
[1] Joseph P. Cannon,et al. An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .
[2] B. Preneel,et al. Anonymity controlled electronic payment systems , 1999 .
[3] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[4] S. Doherty. Cover story: keeping data private , 2001 .
[5] Yiannis Tsiounis. A Security Framework for Card-Based Systems , 2001, Financial Cryptography.
[6] Christian Damsgaard Jensen,et al. Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.
[7] Christopher K. I. Williams,et al. Unsupervised Learning of Multiple Aspects of Moving Objects from Video , 2005, Panhellenic Conference on Informatics.
[8] Javier López,et al. Trust, Privacy and Security in E-Business: Requirements and Solutions , 2005, Panhellenic Conference on Informatics.
[9] Jianfeng Guo,et al. Some methods to depress the risks of the online transactions , 2005, ICEC '05.
[10] Abhi Shelat,et al. Privacy and identity management for everyone , 2005, DIM '05.
[11] Lorrie Faith Cranor,et al. Privacy in India: Attitudes and Awareness , 2005, Privacy Enhancing Technologies.
[12] Lynette Barnard,et al. A trust model for E-commerce in South Africa , 2005, South Afr. Comput. J..
[13] Trevor T. Moores,et al. Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.
[14] James V. Hansen,et al. The application of model checking for securing e-commerce transactions , 2006, Commun. ACM.
[15] Elizabeth Sillence,et al. A framework for understanding trust factors in web-based health advice , 2006, Int. J. Hum. Comput. Stud..
[16] Thompson S. H. Teo,et al. Consumer trust in e-commerce in the United States, Singapore and China , 2007 .
[17] Elisa Bertino,et al. Receipt management- transaction history based trust establishment , 2007, DIM '07.
[18] Paul Jen-Hwa Hu,et al. Examining customers' trust in online vendors and their dropout decisions: An empirical study , 2007, Electron. Commer. Res. Appl..
[19] Sabah S. Al-Fedaghi. How sensitive is your personal information? , 2007, SAC '07.