- Autonomous Agents 2001. Fourth International Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, Canada (May 29, 2001); www.ip.rm.cnr.it/news/wstrust.htm.Google Scholar
- Basu, A. and Muylle, S. Online support for commerce processes by Web retailers. Decision Support Systems 34, 4 (Mar. 2003), 379--395. Google ScholarDigital Library
- Choi, S., Stahl, D., and Whinston, A. The Economics of Electronic Commerce. Macmillan Technical Publishing, Indianapolis, IN, 1997. Google ScholarDigital Library
- CommerceNet. Barriers to Electronic Commerce 2000 Study; http://www.commerce.net.Google Scholar
- Friedman, B., Kahn, P., and Howe, D. Trust online. Commun. ACM 43, 12 (December 2000), 34--40. Google ScholarDigital Library
- Grazioli, S., and Jarvenpaa, S. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics---Part A: Systems and Humans 30, 4 (July 2000), 395--410. Google ScholarDigital Library
- Hoffman, D., Novak, T., and Peralta, M. Building consumer trust online. Commun. ACM 42, 4 (Apr. 1999), 80--85. Google ScholarDigital Library
- Jarvenpaa, S., and Tractinsky, N. Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication 5, 2 (December 1999); http://www.ascusc.org/jcmc/vol5/issue2/jarvenpaa.html.Google Scholar
- Kambil, A., and van Heck, E. Reengineering the Dutch flower auctions: A framework for analyzing exchange organizations. Information Systems Research 9, 1 (Mar. 1998), 1--19. Google ScholarDigital Library
- Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara K. Reputation systems. Commun. ACM 43, 12 (Dec. 2000), 45--48. Google ScholarDigital Library
- Sandhu, R., and Samarati, P. Authentication, access control, and audit. ACM Computing Surveys 28, 1 (Mar. 1996), 241--243. Google ScholarDigital Library
- Whitten, A., and Tygar, J.D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. Working paper, School of Computer Science, CMU (2002).Google Scholar
Index Terms
- Authentication in e-commerce
Recommendations
Perceptual Digital Watermarking for Image Authentication in Electronic Commerce
Digital watermarking has been presented to protect the copyright of electronic multimedia data. The previous proposed watermarking algorithms mostly embed sequences of random numbers or binary images as the watermarks. In this paper, an image ...
A watermarking-based image ownership and tampering authentication scheme
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is ...
Multipurpose watermarking for image authentication and protection
We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (...
Comments