Secure e-transactions protocol using intelligent mobile agents with fair privacy
Electronic commerce has pushed and benefited from the development of intelligent mobile agents technology. One of the reasons is electronic commerce needs remote searching and negotiating between one customer and a number of E-shops. This chapter presents a new secure electronic commerce protocol. W...
| Main Authors: | Han, Song, Chang, Elizabeth, Dillon, Tharam S. |
|---|---|
| Format: | Book Chapter |
| Published: |
Springer-Verlag
2006
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/29171 |
Similar Items
Secure transactions using mobile agents with TTP
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Dynamic user reconfigurable privacy and trust settigs for collaborative industrial environments
by: Skinner, G
Published: (2005)
by: Skinner, G
Published: (2005)
Young people's policy recommendations on algorithm fairness
by: Perez, Elvira, et al.
Published: (2017)
by: Perez, Elvira, et al.
Published: (2017)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A survey of pedagogical functions of intelligent agents in virtual learning environments
by: Soliman, Mohamed, et al.
Published: (2011)
by: Soliman, Mohamed, et al.
Published: (2011)
Evaluation of intelligent agent frameworks for human learning
by: Soliman, M., et al.
Published: (2011)
by: Soliman, M., et al.
Published: (2011)
Implementing intelligent pedagogical agents in virtual worlds: Tutoring natural science experiments in OpenWonderland
by: Soliman, M., et al.
Published: (2013)
by: Soliman, M., et al.
Published: (2013)
Fair decomposition of group obligations
by: Alechina, Natasha, et al.
Published: (2017)
by: Alechina, Natasha, et al.
Published: (2017)
Models of multi-agent decision making
by: Zappala, Julian
Published: (2014)
by: Zappala, Julian
Published: (2014)
An agent on my shoulder: AI, privacy and the application of human-like computing technologies to music creation
by: Chamberlain, Alan, et al.
Published: (2017)
by: Chamberlain, Alan, et al.
Published: (2017)
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
Soft computing agents for e-health applied to the research and control of unknown diseases
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Simulating Interactive Learning Scenarios with Intelligent Pedagogical Agents in a Virtual World through BDI-Based Agents
by: Soliman, M., et al.
Published: (2013)
by: Soliman, M., et al.
Published: (2013)
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014)
by: Zakhary, Sameh, et al.
Published: (2014)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Similar Items
-
Secure transactions using mobile agents with TTP
by: Han, Song, et al.
Published: (2005) -
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005) -
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006) -
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)