نتایج جستجو برای: third e
تعداد نتایج: 1245303 فیلتر نتایج به سال:
Internet fraud has been on the rise in online consumer-to-consumer (C2C) auction markets, posing serious challenges to people’s trust in electronic markets. Among various remedies to promote trust and reduce trader’s risk, online escrow service has been proposed as a trusted third party to protect online transactions from Internet fraud. However, whether an escrow service constitutes a viable b...
Contract signing is a practical application of the fair exchange of digital signatures. This application used to be realized by directly adopting the results of the fair exchange of signatures, which do not completely meet the requirements of the signing of a secret contract. The assistance of a trusted third party (TTP) and some cryptographic technology are required to allow two parties to exc...
Gradually, copyright-protection protocols have attracted much attention in that they provide effective copyright protection mechanisms. Asymmetric copyright-protection protocols allow the buyer to know and possess the protected content yet the seller has no idea about it. Subsequently, if an illegal copy is found, the seller can identify the buyer by cooperating with a trusted third party. Most...
In electronic commerce trust building measures are one way to make a marketplace more attractive for suppliers and potential customers. Often trust on marketplaces is built up through external trusted third parties (TTPs). TTPs are organizations that deal with various trust-related problems and are themselves trusted by the customers. This paper describes the different trust problems that arose...
Recently, there are two mainly methods for SMEs operating cross-border e-commerce in China. One is online store of firms via the cross-border third party platform. The other is the online store of firms built by themselves for export markets expansion. Based on the analysis of cross-border e-commerce process, we explore four factors which may affect the mode selection of cross-border e-commerce...
Internet privacy is of increasing interest, since online services are getting more and more ubiquitous and cover many aspects of one’s daily life. Hence users leave information tracks and disclose information during usage of services which can be compiled by third parties to infer users behavior, preferences etc. and thus may violate user’s privacy. In this paper we propose a practical method f...
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that the signature will only be valid at time t or later, when a trusted third party called time server releases time-dependent information for checking the validity of a time capsule signature. Also, the actual signer of a...
Fair exchange between two or more potentially mutually distrusted parties has been identified as an important issue in electronic commerce. However, the correctness (fairness) of the existing fair exchange protocols that use a Trusted Third Party (TTP) is based on the assumption that during an exchange there are no failures at any of the local systems involved in the exchange, which is too stro...
Background and aim: First permanent molars with poor prognosis may be candidate for timely extraction and replacement by second permanent molars. The presence of third molars should be considered in this treatment plan. The aim of the present study was to evaluate the critical developmental stages of permanent second molar and the status of third molar bud in an Iranian population. Materials an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید