


default search action
TrustBus 2005: Copenhagen, Denmark
- Sokratis K. Katsikas, Javier López, Günther Pernul:

Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3592, Springer 2005, ISBN 3-540-28224-6 - Hannes Federrath:

Privacy Enhanced Technologies: Methods - Markets - Misuse. 1-9 - Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris:

Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. 10-19 - Klaus Plößl, Hannes Federrath, Thomas Nowey:

Protection Mechanisms Against Phishing Attacks. 20-29 - Jordi Castellà-Roca

, Francesc Sebé, Josep Domingo-Ferrer:
Dropout-Tolerant TTP-Free Mental Poker. 30-40 - Bumjoo Park, Kiejin Park, Sungsoo Kim:

A Self-healing Mechanism for an Intrusion Tolerance System. 41-49 - Jianshu Weng

, Chunyan Miao, Angela Goh:
Protecting Online Rating Systems from Unfair Ratings. 50-59 - Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila

, Llorenç Huguet i Rotger:
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. 60-69 - Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd:

Designing Secure E-Tendering Systems. 70-79 - Stephan Groß, Sabine Lein, Sandra Steinbrecher:

A Multilateral Secure Payment System for Wireless LAN Hotspots. 80-89 - Junghyun Nam, Seungjoo Kim

, Dongho Won:
Secure Group Communications over Combined Wired and Wireless Networks. 90-99 - Oliver Jorns, Oliver Jung, Julia Gross, Sandford Bessler:

A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. 100-109 - Heiko Rossnagel

, Denis Royer:
Making Money with Mobile Qualified Electronic Signatures. 110-118 - Jose L. Muñoz, Jordi Forné

, Oscar Esparza
, Manel Rey:
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). 119-127 - Hyun-A Park, Jin Wook Byun, Dong Hoon Lee:

Secure Index Search for Groups. 128-140 - Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland

:
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. 141-150 - Ching Lin, Vijay Varadharajan, Yan Wang:

Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. 151-160 - Elizabeth Chang

, Patricia Thomson, Tharam S. Dillon, Farookh Khadeer Hussain:
The Fuzzy and Dynamic Nature of Trust. 161-174 - Lea Viljanen:

Towards an Ontology of Trust. 175-184 - Jianhong Zhang, Jiancheng Zou, Yumin Wang:

An Improved Group Signature Scheme. 185-194 - Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee:

Efficient Member Revocation in Group Signature Schemes. 195-205 - Marek Klonowski, Miroslaw Kutylowski, Anna Lauks

, Filip Zagórski
:
Conditional Digital Signatures. 206-215 - Seung-Hyun Seo

, Kyung-Ah Shim, Sang-Ho Lee:
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. 216-225 - Marco Casassa Mont

, Robert Thyne, Pete Bramhall:
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. 226-235 - Marco Casassa Mont

, Siani Pearson
:
An Adaptive Privacy Management System for Data Repositories. 236-245 - Ayça Azgin Hintoglu, Yücel Saygin, Salima Benbernou, Mohand-Said Hacid:

Privacy Preserving Data Mining Services on the Web. 246-255 - Sylvia Mercado Kierkegaard:

Reading Your Keystroke: Whose Mail Is It? 256-265 - Huafei Zhu, Feng Bao:

A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. 266-273 - JungHoon Ha, Jianying Zhou, Sang-Jae Moon:

An Improved Double Auction Protocol Against False Bids. 274-287 - Glenn Bewsell, Rodger Jamieson, Adrian Gardiner, Deborah Bunker:

An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions. 288-298 - Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan:

A Secure Fingerprint Authentication System on an Untrusted Computing Environment. 299-310 - Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo:

Security Enhancement for Password Authentication Schemes with Smart Cards. 311-320 - Luigi Catuogno

, Roberto Gassirà, Michele Masullo, Ivan Visconti:
Securing Operating System Services Based on Smart Cards. 321-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














