Subject
Management of Technology and Innovation,Marketing,Computer Networks and Communications,Computer Science Applications
Reference20 articles.
1. F. Akhter, D. Hobbs, Z. Maamar, Determining the factors which engender customer trust in business-to-consumer (B2C) electronic commerce, in: Proceedings of the IEEE International Conference on E-Commerce Technology, 2004, pp. 291–294.
2. R. Canetti, et al., Multicast Security: a taxonomy and some efficient constructions, in: INFOCOM ’99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 2 , 1999, pp. 708–716.
3. A public key cryptosystem and a signature scheme based on discrete logarithms;Elgamal;IEEE Transactions on Information Theory,1985
4. U. Greveler, How Pay-TV becomes E-Commerce, in: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, 2005, pp. 508–511.
5. D. Halevy, A. Shamir, The LSD broadcast encryption scheme, in: CRYPTO 2002, LNCS 2442, 2002, pp. 47–60.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献