200E-<strong>Commerce</strong>Frankel, Y., Tsiounis, Y. & Yung, M. (1996), Indirect disclosure proof: Achieving. efficientfair on-line e-cash, in ‘Advances in Cryptology - Asiacrypt 1996’, LNCS 1163, pp.286-300.Goi, B.-M., Phan, R. C.-W., Yang, Y., Bao, F., Deng, R. H. & Siddiqi, M. U. (2004),Cryptanalysis of two anonymous buyer-seller watermarking protocols and animprovement for true anonymity, in ‘Applied Cryptography and NetworkSecurity’, LNCS 2587, pp. 369-382.Goldwasser, S. & Micali, S. (1982), Probabilistic encryption and how to play mental pokerhiding all partial information, in ‘Proceedings of the 14th Annual ACM Symposiumon the Theory of Computing’, pp. 365-377.Hartung, F. & Kutter, M. (1999), Multimedia watermarking techniques, Vol. 87, pp. 1079-1107. Invited paper.Ibrahim, I. M., El-Din, S. H. N. & Hegazy, A. F. A. (2007), An effective and secure buyersellerwatermarking protocol, in ‘Third International Symposium on InformationAssurance and Security, 2007. IAS 2007’, pp. 21-28.Jae-Gwi Choi, Kouichi Sakurai, J.-H. P. (2003), Does it need trusted third party? design ofbuyer-seller watermarking protocol without trusted third party, in ‘AppliedCryptography and Network Security’, LNCS 2846, pp. 265-279.Ju, H.-S., Kim, H.-J., Lee, D.-H. & Lim, J.-I. (2002), `An anonymous buyer-sellerwatermarking protocol with anonymity control', Information Security andCryptology – ICISC, pp. 421-432.Kerckhoffs, A. (1883), `La cryptographie militaire', Journal des sciences militaires IX, 5-83.Kilian, J. & Petrank, E. (1998), Identity escrow, LNCS 1462, pp. 169-185.Kutter, M. & Petitcolas, F. A. P. (1999), A fair benchmark for image watermarking systems,in ‘SPIE Security and Watermarking of Multimedia Contents’, Vol. 3657, pp. 226-239.Lei, C.-L., Yu, P.-L., Tsai, P.-L. & Chan, M.-H. (2004), ‘An efficient and anonymous buyersellerwatermarking protocol’, IEEE Transactions on Image Processing 13(12), 1618-1626.Liu, K., Trappe, W., Wang, Z., Wu, M. & Zhao, H. (2005), Multimedia FingerprintingForensics for Traitor Tracing, EURASIP Book Series on Signal Processing andCommunications, Hindawi Publishing Co.Memon, N. D. & Wong, P. W. (2001), ‘A buyer-seller watermarking protocol’, IEEETransactions on Image Processing 10(4), 643-649.Paillier, P. (1999), Public-key cryptosystems based on composite degree residuosity classes,in ‘Advances in Cryptology EUROCRYPT 1999’, LNCS 1592, Springer-Verlag, pp.223-238.Pfitzmann, B. & Sadeghi, A. R. (1999), Coin-based anonymous fingerprinting, in ‘Advancesin Cryptology EUROCRYPT 1999’, LNCS 1592, Springer-Verlag, pp. 150-164.Pfitzmann, B. & Sadeghi, A. R. (2000), Anonymous fingerprinting with direct nonrepudiation,in ‘Advances in Cryptology ASIACRYPT 2000’, LNCS 1976, Springer-Verlag, pp. 401-414.Pfitzmann, B. & Waidner, M. (1997), Anonymous fingerprinting, in ‘Advances inCryptology EUROCRYPT 1997’, pp. 88-102.Pfitzmann, B. & Schunter, M. (1996), Asymmetric fingerprinting, in ‘Advances inCryptology EUROCRYPT 1996’, LNCS 1070, Springer-Verlag, pp. 84-95.
Attacks on Two Buyer-Seller WatermarkingProtocols and an Improvement for Revocable Anonymity 201Poupard, G. & Stern, J. (2000), Fair encryption of RSA keys, in ‘Adv. in Cryptology –EUROCRYPT 2000’, LNCS 1807, pp. 172-190.Qiao, L. & Nahrstedt, K. (1998), ‘Watermarking schemes and protocols for protectingrightful ownership and customer’s rights’, Journal of Visual Communication andImage Representation 9(3), 194 - 210.Rivest, R. L., Shamir, A. & Adelman, L. M. (1978), ‘A method for obtaining digital signaturesand public-key cryptosystems’, Communication of the ACM 21(2), 120-126.Shao, M.-H. (2007), A privacy-preserving buyer-seller watermarking protocol with semitrustthird party, in ‘Trust, Privacy and Security in Digital Business’, LNCS 4657,pp. 44-53.Trappe, W., Wu, M., Wang, Z. J. & Liu, K. J. R. (2003), ‘Anti-collusion forensics ofmultimedia fingerprinting using orthogonal modulation’, IEEE Transactions onImage Processing 51(4), 1069 - 1087.Wang, Z. J., Wu, M., Zhao, H. V., Trappe, W. & Liu, K. J. R. (2005), ‘Anti-collusion forensicsof multimedia fingerprinting using orthogonal modulation’, IEEE Transactions onImage Processing 14(6), 804 - 821.Young, A. & Yung, M. (1998), Auto-recoverable auto-certifiable cryptosystems, in‘EUROCRYPT 1998’, pp. 17-31.Zhang, J., Kou, W. & Fan, K. (2006), Secure buyer-seller watermarking protocol, in ‘IEEProceedings Information Security’, Vol. 153, pp. 15-18.Mina Deng was born in Sept. 1981, Beijing, China. She received MSc. degree in electricalengineering from the Katholieke Universiteit Leuven, Belgium, in 2004.She is currently a PhD student at the Computer Security and Industrial Cryptography(COSIC) research lab, department of electrical engineering, Katholieke Universiteit Leuven,Belgium. She also works as a security and privacy researcher for the Interdisciplinaryinstitute for BroadBand Technology (IBBT) Belgium. She has been involved in servalEuropean research projects, such as “SPEED-Signal Processing in the Encrypted Domain”(2007-present), the European Networks of Excellence “FIDIS-Future of Identity in theInformation Society” (2004-present) and “ECRYPT-European Network of Excellence forCryptology” (2004-2008) by European Commission-Framework Program 6 (EC-FP6).Ms Deng's research interests include cryptography, security and privacy, identitymanagement, and electronic service applications, such as DRM, e-commerce, e-health, etc.She received “Outstanding Achievement Award for best student research paper”, grantedby the New Zealand State Services Commission in 2008, and the “Barco/VIK-Prize” as theBelgian Flemish best engineering thesis prize in 2003.Bart Preneel received a Master's Degree in electrical engineering and the Doctorate inapplied sciences (cryptology) from the Katholieke Universiteit Leuven (Belgium) in 1987and 1993 respectively.He is currently full professor at the Katholieke Universiteit Leuven. He was visitingprofessor at five universities in Europe and was a research fellow at the University ofCalifornia at Berkeley. He has authored and co-authored more than 200 reviewed scientificpublications and is inventor of two patents. His main research interests are cryptographyand information security.
- Page 1:
IE-Commerce
- Page 4 and 5:
Published by In-TehIn-TehOlajnica 1
- Page 7 and 8:
VIIWe wish to thank the reviewers o
- Page 9:
IXContentsPrefaceV1. A Conceptual F
- Page 13 and 14:
A Conceptual Framework and an Exten
- Page 15 and 16:
A Conceptual Framework and an Exten
- Page 17 and 18:
A Conceptual Framework and an Exten
- Page 19:
A Conceptual Framework and an Exten
- Page 22 and 23:
12E-CommerceThe Application Layer c
- Page 24 and 25:
14E-CommerceService description. Th
- Page 26 and 27:
16E-Commerceunderstanding about the
- Page 28 and 29:
18E-CommerceThis chapter contribute
- Page 30 and 31:
20E-CommercePorter M (2001). Strate
- Page 32 and 33:
22E-CommerceTo evaluate the e-comme
- Page 34 and 35:
24E-CommerceAa 2a a4m1 m 2 m 3m (
- Page 36 and 37:
26E-CommerceV v ij , i 1,2,...,
- Page 38 and 39:
28E-CommerceIndexFuzzy numberAltern
- Page 40 and 41:
30E-CommerceS. Mabuchi (1988). An a
- Page 42 and 43:
32E-Commercetechnology implementati
- Page 44 and 45:
34E-Commerceapplied to study an ind
- Page 46 and 47:
36E-Commerce PEOU of the public sec
- Page 48 and 49:
38E-CommerceNITC (National Informat
- Page 50 and 51:
40E-Commercewill describe the mecha
- Page 52 and 53:
42E-Commerce(2) The manner of commu
- Page 54 and 55:
44E-CommerceIf ADS is employed in a
- Page 56 and 57:
46E-Commerce4.2 Case studyThe detai
- Page 58 and 59:
48E-CommerceAs a high-speed develop
- Page 60 and 61:
50E-Commerce4.3.2 The architecture
- Page 62 and 63:
52E-Commerceone conclusion is that
- Page 64 and 65:
54E-Commerce
- Page 66 and 67:
56E-Commerceorganizations expose de
- Page 68 and 69:
58E-Commercerules. Such adapters ne
- Page 70 and 71:
60E-CommerceThe third level of inve
- Page 72 and 73:
62E-Commercecommon “language” h
- Page 74 and 75:
64E-Commercewell described in (Mül
- Page 76 and 77:
66E-Commerce3.3 Organizational Comp
- Page 78 and 79:
68E-Commercethe interaction of defi
- Page 80 and 81:
70E-CommerceAs a first step towards
- Page 82 and 83:
72E-Commerce5. Conclusion and Outlo
- Page 84 and 85:
74E-CommerceSchmid, B. F., Schroth,
- Page 86 and 87:
76E-CommerceThe following section p
- Page 88 and 89:
78E-Commerce(a) G cooc(b) G overlap
- Page 90 and 91:
80E-CommerceBetweenness centrality
- Page 92 and 93:
82E-Commerce4.1.1 Generating Networ
- Page 94 and 95:
84E-CommerceThe resultant value som
- Page 96 and 97:
86E-CommerceG shareholdershareholdi
- Page 98 and 99:
88E-Commerce17: Murata Noda Screen
- Page 100 and 101:
90E-Commerceand testing data in the
- Page 102:
92E-Commerce(c) Centrality-based ra
- Page 105 and 106:
Ranking Companies Based on Multiple
- Page 107 and 108:
Ranking Companies Based on Multiple
- Page 109 and 110:
Considering Culture in Designing We
- Page 111 and 112:
Considering Culture in Designing We
- Page 113 and 114:
Considering Culture in Designing We
- Page 115 and 116:
Considering Culture in Designing We
- Page 117 and 118:
Considering Culture in Designing We
- Page 119 and 120:
Considering Culture in Designing We
- Page 121 and 122:
Considering Culture in Designing We
- Page 123 and 124:
Consumer Responses to Colors of E-C
- Page 125 and 126:
Consumer Responses to Colors of E-C
- Page 127 and 128:
Consumer Responses to Colors of E-C
- Page 130 and 131:
120E-Commerce4. Research methodOur
- Page 132 and 133:
122E-Commerceavailable information
- Page 134 and 135:
124E-CommerceNewsvine Green. Starti
- Page 136 and 137:
126E-CommerceProcedureRespondents w
- Page 138 and 139:
128E-Commerce6. Data analysis and r
- Page 140 and 141:
130E-CommerceHue 1Newsvine Green (d
- Page 142 and 143:
132E-CommerceEffects of graphic cha
- Page 144 and 145:
134E-Commercethe consumer retains w
- Page 146 and 147:
136E-Commercemaintain, load more ra
- Page 148 and 149:
138E-CommerceBellizzi J. A. & Hite
- Page 150 and 151:
140E-CommerceHill A. & Scharff L. V
- Page 152 and 153:
142E-CommerceSpool J. M., Scanlon T
- Page 154 and 155:
144E-CommerceConsequently, we concl
- Page 156 and 157:
146E-CommerceDimensionsSystems qual
- Page 158 and 159:
148E-Commercefunction deployment (Q
- Page 160 and 161: 150E-CommerceUseful help serviceEle
- Page 162 and 163: 152E-Commerceplanning, enacting and
- Page 164 and 165: 154E-Commercecomplete and measurabl
- Page 166 and 167: 156E-Commerce There is "About us" s
- Page 168 and 169: 158E-Commerce Validation testing -
- Page 170 and 171: 160E-Commercefor the Websites (Lohs
- Page 172 and 173: 162E-CommerceSinnappan S., Carlson
- Page 174 and 175: 164E-Commercerecommendations of a t
- Page 176 and 177: 166E-Commerce3.1 Neighborhood Based
- Page 178 and 179: 168E-Commerce3.3 Significance Weigh
- Page 180 and 181: 170E-Commerce , u1 0,fR5fuR1 u2else
- Page 182 and 183: 172E-CommerceFigure 6 shows the ste
- Page 184 and 185: 174E-CommerceMAE0.750.740.730.720.7
- Page 187 and 188: Improving performance in recommende
- Page 189 and 190: Improving performance in recommende
- Page 191 and 192: Improving performance in recommende
- Page 193 and 194: Attacks on Two Buyer-Seller Waterma
- Page 195 and 196: Attacks on Two Buyer-Seller Waterma
- Page 197 and 198: Attacks on Two Buyer-Seller Waterma
- Page 199 and 200: Attacks on Two Buyer-Seller Waterma
- Page 201 and 202: Attacks on Two Buyer-Seller Waterma
- Page 203 and 204: Attacks on Two Buyer-Seller Waterma
- Page 205 and 206: Attacks on Two Buyer-Seller Waterma
- Page 207 and 208: Attacks on Two Buyer-Seller Waterma
- Page 209: Attacks on Two Buyer-Seller Waterma
- Page 213 and 214: Electronic Commerce Readinessin Dev
- Page 215 and 216: Electronic Commerce Readinessin Dev
- Page 217 and 218: Electronic Commerce Readinessin Dev
- Page 219 and 220: Electronic Commerce Readinessin Dev
- Page 221 and 222: Electronic Commerce Readinessin Dev
- Page 223 and 224: Electronic Commerce Readinessin Dev
- Page 225 and 226: Electronic Commerce Readinessin Dev
- Page 227 and 228: Electronic Commerce Readinessin Dev
- Page 229 and 230: Electronic Commerce Readinessin Dev
- Page 231 and 232: Electronic Commerce Readinessin Dev
- Page 233 and 234: Electronic Commerce Readinessin Dev
- Page 235 and 236: Electronic Commerce Readinessin Dev
- Page 237 and 238: Electronic Commerce Readinessin Dev
- Page 239 and 240: Can a Recommender System induce ser
- Page 241 and 242: Can a Recommender System induce ser
- Page 243 and 244: Can a Recommender System induce ser
- Page 245 and 246: Can a Recommender System induce ser
- Page 247 and 248: Can a Recommender System induce ser
- Page 249 and 250: Can a Recommender System induce ser
- Page 251 and 252: Can a Recommender System induce ser
- Page 253 and 254: Can a Recommender System induce ser
- Page 255 and 256: Can a Recommender System induce ser
- Page 257 and 258: A Mobile Commerce Model for Automob
- Page 259 and 260: A Mobile Commerce Model for Automob
- Page 261 and 262:
A Mobile Commerce Model for Automob
- Page 263 and 264:
A Mobile Commerce Model for Automob
- Page 265 and 266:
A Mobile Commerce Model for Automob
- Page 267 and 268:
A Mobile Commerce Model for Automob
- Page 269 and 270:
A Mobile Commerce Model for Automob
- Page 271 and 272:
A Mobile Commerce Model for Automob
- Page 273 and 274:
A Mobile Commerce Model for Automob
- Page 275 and 276:
A Mobile Commerce Model for Automob
- Page 277 and 278:
The Automatic Attaching Function Ba
- Page 279 and 280:
The Automatic Attaching Function Ba
- Page 281 and 282:
The Automatic Attaching Function Ba
- Page 283 and 284:
The Automatic Attaching Function Ba
- Page 285 and 286:
The Automatic Attaching Function Ba
- Page 287 and 288:
The Automatic Attaching Function Ba
- Page 289 and 290:
The Automatic Attaching Function Ba
- Page 291 and 292:
The Automatic Attaching Function Ba
- Page 293 and 294:
The Automatic Attaching Function Ba