Auction is an effective and convenient method to negotiate price and distribute resources. In an open and unreliable environment like the Internet, there are many threats to security of electronic auction. It is challenge to overcome them and design secure e-auction protocols. In the last several years, a lot of Internet auction websites like E-Bay have appeared. At the same time, more and more cryptographic applications to electronic auctions have been proposed. Cryptology has proved to be a key technique to implement security and privacy in electronic auctions. As public key cryptology is...
Auction is an effective and convenient method to negotiate price and distribute resources. In an open and unreliable environment like the Internet, th...
In today s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for...
In today s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of t...