哪能仁慈 发表于 2025-3-21 16:52:23

书目名称Collaborative, Trusted and Privacy-Aware e/m-Services影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0229491<br><br>        <br><br>书目名称Collaborative, Trusted and Privacy-Aware e/m-Services读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0229491<br><br>        <br><br>

流利圆滑 发表于 2025-3-21 23:56:42

Order Effects in Observations of Stated and Revealed Privacy Preferencesks, doubts about sustainability of trusted relationships remain. Surveying consumers about their preferences reveals severe concerns about the fate of their personal data. In stark contrast to privacy concerns (stated preferences), however, consumers generously disclose personal data in exchange for

裁决 发表于 2025-3-22 03:57:49

A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Senificant research questions relate to data confidentiality and user privacy. Encryption was regarded as a solution for data confidentiality. The privacy of a user is characterized by the query he poses to the server and its result. We explore the techniques to execute the SQL query over the encrypte

隐士 发表于 2025-3-22 07:44:12

Assessing Emotions Related to Privacy and Trust in Personalized Servicesess and anxiety were chosen. A sample of 182 online shoppers was used to assess the effect of privacy and trust on their emotions through personalized services, and how these emotions ultimately affect their purchase intentions. The findings indicate that privacy affects anxiety while trust affects

伸展 发表于 2025-3-22 11:10:24

Trust and Privacy in the Shift from E-Commerce to M-Commerce: A Comparative Approachpts and re-examining their antecedents in the mobile context. This paper attempts a comparative approach to the issues of trust and privacy in e-commerce and m-commerce. It investigates how trust and privacy are differentiated with the shift from the context of e-commerce to the context of m-commerc

SCORE 发表于 2025-3-22 16:25:52

A Cloud Provider Description Schema for Meeting Legal Requirements in Cloud Federation Scenarios Clouds and federated Clouds. Existing legislation currently creates constraints and boundaries in the free usage of external Cloud providers. The aim of this paper is to provide a schema definition and usage mechanism (CPDS) that includes various levels of legal information that is necessary for au

SCORE 发表于 2025-3-22 20:18:44

http://reply.papertrans.cn/23/2295/229491/229491_7.png

Overstate 发表于 2025-3-22 21:49:20

A Methodology for the Development and Verification of Access Control Systems in Cloud Computingd computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this p

fodlder 发表于 2025-3-23 03:11:24

Simple Mail Delivery Protocolh both origin and destination email servers. Messages are kept to the origin email server until a confirmation from the recipient is issued though the destination email server. Therefore, spam email doesn’t travel the Internet and doesn’t overload the destination email server and recipient’s mailbox

conduct 发表于 2025-3-23 06:21:07

Why Are Users of Social Media Inclined to Word-of-Mouth?d services. However, there is much debate in the academic and business community about the effectiveness of social media as a platform for marketing. Specifically, practitioners are concerned with how Word-of-Mouth (WOM) is spread through these sites, and what aspects facilitate users in doing so. T
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Collaborative, Trusted and Privacy-Aware e/m-Services; 12th IFIP WG 6.11 Co Christos Douligeris,Nineta Polemi,Winfried Lamersd Conference p