top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Topics in Cryptology -- CT-RSA 2005 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings / / edited by Alfred John Menezes
Topics in Cryptology -- CT-RSA 2005 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings / / edited by Alfred John Menezes
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 390 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-30574-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinking Generator -- Public-Key Encryption -- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption -- A Generic Conversion with Optimal Redundancy -- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 -- Signature Schemes -- Foundations of Group Signatures: The Case of Dynamic Groups -- Time-Selective Convertible Undeniable Signatures -- Design Principles -- On Tolerant Cryptographic Constructions -- Password-Based Protocols -- Simple Password-Based Encrypted Key Exchange Protocols -- Hard Bits of the Discrete Log with Applications to Password Authentication -- Proofs for Two-Server Password Authentication -- Design and Analysis of Password-Based Key Derivation Functions -- Pairings -- A New Two-Party Identity-Based Authenticated Key Agreement -- Accumulators from Bilinear Pairings and Applications -- Computing the Tate Pairing -- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings -- Efficient and Secure Implementation -- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box -- CryptoGraphics: Secret Key Cryptography Using Graphics Cards -- Side-Channel Leakage of Masked CMOS Gates -- New Minimal Weight Representations for Left-to-Right Window Methods.
Record Nr. UNISA-996466022203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Topics in Cryptology -- CT-RSA 2006 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings / / edited by David Pointcheval
Topics in Cryptology -- CT-RSA 2006 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings / / edited by David Pointcheval
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 365 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-32648-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks on AES -- Cache Attacks and Countermeasures: The Case of AES -- Related-Key Impossible Differential Attacks on 8-Round AES-192 -- Identification -- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators -- Fair Identification -- Algebra -- Efficient Doubling on Genus 3 Curves over Binary Fields -- Another Look at Small RSA Exponents -- Integrity -- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing -- RFID-Tags for Anti-counterfeiting -- Public Key Encryption -- A “Medium-Field” Multivariate Public-Key Encryption Scheme -- A New Security Proof for Damgård’s ElGamal -- Signatures -- Stand-Alone and Setup-Free Verifiably Committed Signatures -- Toward the Fair Anonymous Signatures: Deniable Ring Signatures -- Side-Channel Attacks -- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers -- Higher Order Masking of the AES -- CCA Encryption -- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles -- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication -- On the (Im)possibility of Blind Message Authentication Codes -- An Optimal Non-interactive Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers -- Block Ciphers Sensitive to Gröbner Basis Attacks -- Multi-party Computation -- Universally Composable Oblivious Transfer in the Multi-party Setting -- A Round and Communication Efficient Secure Ranking Protocol.
Record Nr. UNINA-9910481961503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in Cryptology -- CT-RSA 2006 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings / / edited by David Pointcheval
Topics in Cryptology -- CT-RSA 2006 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings / / edited by David Pointcheval
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 365 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-32648-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks on AES -- Cache Attacks and Countermeasures: The Case of AES -- Related-Key Impossible Differential Attacks on 8-Round AES-192 -- Identification -- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators -- Fair Identification -- Algebra -- Efficient Doubling on Genus 3 Curves over Binary Fields -- Another Look at Small RSA Exponents -- Integrity -- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing -- RFID-Tags for Anti-counterfeiting -- Public Key Encryption -- A “Medium-Field” Multivariate Public-Key Encryption Scheme -- A New Security Proof for Damgård’s ElGamal -- Signatures -- Stand-Alone and Setup-Free Verifiably Committed Signatures -- Toward the Fair Anonymous Signatures: Deniable Ring Signatures -- Side-Channel Attacks -- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers -- Higher Order Masking of the AES -- CCA Encryption -- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles -- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication -- On the (Im)possibility of Blind Message Authentication Codes -- An Optimal Non-interactive Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers -- Block Ciphers Sensitive to Gröbner Basis Attacks -- Multi-party Computation -- Universally Composable Oblivious Transfer in the Multi-party Setting -- A Round and Communication Efficient Secure Ranking Protocol.
Record Nr. UNISA-996466093403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 403 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Computer security
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-69328-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric-Key Encryption -- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers -- A Simple Related-Key Attack on the Full SHACAL-1 -- Signatures and Authentication -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A Practical Optimal Padding for Signature Schemes -- Directed Transitive Signature Scheme -- Identity-Based Multi-signatures from RSA -- Cryptographic Protocols (I) -- Improved Efficiency for Private Stable Matching -- Compact E-Cash from Bounded Accumulator -- Batch Processing of Interactive Proofs -- Side-Channel Attacks (I) -- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls -- Predicting Secret Keys Via Branch Prediction -- Side-Channel Attacks (II) -- Template Attacks on Masking—Resistance Is Futile -- Differential Power Analysis of Stream Ciphers -- Cache Based Remote Timing Attack on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement -- Efficient Password-Authenticated Key Exchange Based on RSA -- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels -- Digital Signatures (II) -- A Practical and Tightly Secure Signature Scheme Without Hash Function -- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature -- Efficient Implementation -- Public Key Cryptography and RFID Tags -- A Bit-Slice Implementation of the Whirlpool Hash Function.
Record Nr. UNINA-9910484786403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 403 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Computer security
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-69328-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric-Key Encryption -- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers -- A Simple Related-Key Attack on the Full SHACAL-1 -- Signatures and Authentication -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A Practical Optimal Padding for Signature Schemes -- Directed Transitive Signature Scheme -- Identity-Based Multi-signatures from RSA -- Cryptographic Protocols (I) -- Improved Efficiency for Private Stable Matching -- Compact E-Cash from Bounded Accumulator -- Batch Processing of Interactive Proofs -- Side-Channel Attacks (I) -- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls -- Predicting Secret Keys Via Branch Prediction -- Side-Channel Attacks (II) -- Template Attacks on Masking—Resistance Is Futile -- Differential Power Analysis of Stream Ciphers -- Cache Based Remote Timing Attack on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement -- Efficient Password-Authenticated Key Exchange Based on RSA -- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels -- Digital Signatures (II) -- A Practical and Tightly Secure Signature Scheme Without Hash Function -- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature -- Efficient Implementation -- Public Key Cryptography and RFID Tags -- A Bit-Slice Implementation of the Whirlpool Hash Function.
Record Nr. UNISA-996466161003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2017 [[electronic resource] ] : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings / / edited by Helena Handschuh
Topics in Cryptology – CT-RSA 2017 [[electronic resource] ] : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings / / edited by Helena Handschuh
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 452 p. 78 illus.)
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Management information systems
Computer science
Algorithms
Computer science—Mathematics
Cryptology
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-52153-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Implementations -- Lattice-based Cryptanalysis -- Fault and Glitch Resistant Implementations -- Side-channel Resistant Implementations -- Digital Signatures and Random Numbers -- Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Symmetric Key Constructions -- 2017 Selected Topics -- Improved Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms.
Record Nr. UNINA-9910483294603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2017 [[electronic resource] ] : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings / / edited by Helena Handschuh
Topics in Cryptology – CT-RSA 2017 [[electronic resource] ] : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings / / edited by Helena Handschuh
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 452 p. 78 illus.)
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Management information systems
Computer science
Algorithms
Computer science—Mathematics
Cryptology
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-52153-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Implementations -- Lattice-based Cryptanalysis -- Fault and Glitch Resistant Implementations -- Side-channel Resistant Implementations -- Digital Signatures and Random Numbers -- Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Symmetric Key Constructions -- 2017 Selected Topics -- Improved Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms.
Record Nr. UNISA-996465738603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2018 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings / / edited by Nigel P. Smart
Topics in Cryptology – CT-RSA 2018 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings / / edited by Nigel P. Smart
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 514 p. 90 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Logic design
Computer communication systems
Management information systems
Computer science
Cryptology
Software Engineering/Programming and Operating Systems
Logic Design
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-76953-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- Public-key cryptography -- Symmetric-key cryptography -- Crypto- graphic Protocols -- Primitives and their implementation security.
Record Nr. UNINA-9910349425003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2018 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings / / edited by Nigel P. Smart
Topics in Cryptology – CT-RSA 2018 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings / / edited by Nigel P. Smart
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 514 p. 90 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Logic design
Computer communication systems
Management information systems
Computer science
Cryptology
Software Engineering/Programming and Operating Systems
Logic Design
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-76953-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- Public-key cryptography -- Symmetric-key cryptography -- Crypto- graphic Protocols -- Primitives and their implementation security.
Record Nr. UNISA-996466219703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Topics in Electronic Commerce [[electronic resource] ] : Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001 Proceedings / / edited by Weidong Kou, Yelena Yesha, Chung J. Tan
Topics in Electronic Commerce [[electronic resource] ] : Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001 Proceedings / / edited by Weidong Kou, Yelena Yesha, Chung J. Tan
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (X, 194 p.)
Disciplina 658.84
Collana Lecture Notes in Computer Science
Soggetto topico Trade
Business
Commerce
Computer science
E-commerce
Computer communication systems
Computers and civilization
Management information systems
Popular Computer Science
e-Commerce/e-business
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-45415-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure Payment -- An Efficient Multiple Merchants Payment Protocol for Secure Electronic Transactions Based on Purchase Consolidation -- A Fair Electronic Cash Scheme -- A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment -- Trust and Security -- Building Trust for E-Commerce: Collaborating Label Bureaus -- Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers -- The Implementation of Security Algorithm of Mobile Agent on Roblet -- Tools for E-Commerce Applications -- Active Page Generation via Customizing XML for Data Beans in E-Commerce Applications -- i-Cube: A Tool-Set for the Dynamic Extraction and Integration of Web Data Content -- E-Commerce Frameworks and Systems -- An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce -- CBR-Responder, an Automated Customer Service for E-Commerce -- Performance and QoS -- Introducing QoS to Electronic Commerce Applications -- A Methodology and Implementation for Analytic Modeling in Electronic Commerce Applications -- E-Commerce Surveys -- Internet Based Electronic Business Framework Applications and Business to Business Standards -- Online Auction Protocols: A Comparative Study.
Record Nr. UNINA-9910143597203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...