The SCEAS System
Navigation Menu

Conferences in DBLP

Trust and Privacy in Digital Business (trustbus)
2005 (conf/trustbus/2005)

  1. Hannes Federrath
    Privacy Enhanced Technologies: Methods - Markets - Misuse. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:1-9 [Conf]
  2. Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris
    Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:10-19 [Conf]
  3. Klaus Plößl, Hannes Federrath, Thomas Nowey
    Protection Mechanisms Against Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:20-29 [Conf]
  4. Jordi Castellà-Roca, Francesc Sebé, Josep Domingo-Ferrer
    Dropout-Tolerant TTP-Free Mental Poker. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:30-40 [Conf]
  5. Bumjoo Park, Kiejin Park, Sungsoo Kim
    A Self-healing Mechanism for an Intrusion Tolerance System. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:41-49 [Conf]
  6. Jianshu Weng, Chunyan Miao, Angela Goh
    Protecting Online Rating Systems from Unfair Ratings. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:50-59 [Conf]
  7. Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger
    Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:60-69 [Conf]
  8. Rong Du, Ernest Foo, Juan González Nieto, Colin Boyd
    Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:70-79 [Conf]
  9. Stephan Groß, Sabine Lein, Sandra Steinbrecher
    A Multilateral Secure Payment System for Wireless LAN Hotspots. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:80-89 [Conf]
  10. Junghyun Nam, Seungjoo Kim, Dongho Won
    Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:90-99 [Conf]
  11. Oliver Jorns, Oliver Jung, Julia Gross, Sandford Bessler
    A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:100-109 [Conf]
  12. Heiko Rossnagel, Denis Royer
    Making Money with Mobile Qualified Electronic Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:110-118 [Conf]
  13. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey
    Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:119-127 [Conf]
  14. Hyun-A Park, Jin Wook Byun, Dong Hoon Lee
    Secure Index Search for Groups. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:128-140 [Conf]
  15. Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland
    Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:141-150 [Conf]
  16. Ching Lin, Vijay Varadharajan, Yan Wang
    Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:151-160 [Conf]
  17. Elizabeth Chang, Patricia Thomson, Tharam S. Dillon, Farookh Khadeer Hussain
    The Fuzzy and Dynamic Nature of Trust. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:161-174 [Conf]
  18. Lea Viljanen
    Towards an Ontology of Trust. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:175-184 [Conf]
  19. Jianhong Zhang, Jiancheng Zou, Yumin Wang
    An Improved Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:185-194 [Conf]
  20. Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee
    Efficient Member Revocation in Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:195-205 [Conf]
  21. Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
    Conditional Digital Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:206-215 [Conf]
  22. Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
    A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:216-225 [Conf]
  23. Marco Casassa Mont, Robert Thyne, Pete Bramhall
    Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:226-235 [Conf]
  24. Marco Casassa Mont, Siani Pearson
    An Adaptive Privacy Management System for Data Repositories. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:236-245 [Conf]
  25. Ayça Azgin Hintoglu, Yücel Saygin, Salima Benbernou, Mohand-Said Hacid
    Privacy Preserving Data Mining Services on the Web. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:246-255 [Conf]
  26. Sylvia Mercado Kierkegaard
    Reading Your Keystroke: Whose Mail Is It? [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:256-265 [Conf]
  27. Huafei Zhu, Feng Bao
    A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:266-273 [Conf]
  28. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    An Improved Double Auction Protocol Against False Bids. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:274-287 [Conf]
  29. Glenn Bewsell, Rodger Jamieson, Adrian Gardiner, Deborah Bunker
    An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:288-298 [Conf]
  30. Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan
    A Secure Fingerprint Authentication System on an Untrusted Computing Environment. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:299-310 [Conf]
  31. Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo
    Security Enhancement for Password Authentication Schemes with Smart Cards. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:311-320 [Conf]
  32. Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti
    Securing Operating System Services Based on Smart Cards. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:321-330 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002