Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractJune 2015
Personal Information Sharing with Major User Concerns in the Online B2C Market: A Social Contract Theory Perspective
SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People ResearchPages 7–8https://doi.org/10.1145/2751957.2755507The cyber world has seen growth in the online business over the past two decades and e-commerce continues to expand. Moreover it has brought ease and comfort in the lives of the people and now there is no distinction of states and regions. Mainstream ...
- ArticleJune 2004
New notions of security: achieving universal composability without trusted setup
STOC '04: Proceedings of the thirty-sixth annual ACM symposium on Theory of computingPages 242–251https://doi.org/10.1145/1007352.1007394We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion involves comparing the real protocol execution with an ideal execution involving ideal functionalities (just as in UC-security), but allowing the ...