C. Puri, Kanika Narang, A. Tiwari, Mayank Vatsa, Richa Singh
{"title":"On Analysis of Rural and Urban Indian Fingerprint Images","authors":"C. Puri, Kanika Narang, A. Tiwari, Mayank Vatsa, Richa Singh","doi":"10.1007/978-3-642-12595-9_8","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9_8","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129949325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Models in the E-Commerce Environment","authors":"S. Pittayachawan, Mohini Singh","doi":"10.13140/2.1.3013.4565","DOIUrl":"https://doi.org/10.13140/2.1.3013.4565","url":null,"abstract":"This paper analyses several security systems and aggregates their characteristics supporting trust. These characteristics are then matched with e-business models to try and identify the most suitable security system for each model. This is preliminary work undertaken to establish appropriate trust models in the e-commerce environment. The models discussed in this paper are hypothetical.","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethics and Policy of Biometrics - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers","authors":"Ajay Kumar, David Zhang","doi":"10.1007/978-3-642-12595-9","DOIUrl":"https://doi.org/10.1007/978-3-642-12595-9","url":null,"abstract":"","PeriodicalId":162341,"journal":{"name":"International Conference on Electronic Business","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128796861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}