default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2006
- Vicente Benjumea, Javier López, José M. Troya:
Anonymous attribute certificates based on traceable signatures. Internet Res. 16(2): 120-139 (2006) - Marie-Claude Boudreau, Richard T. Watson:
Internet advertising strategy alignment. Internet Res. 16(1): 23-37 (2006) - Charlott Eliasson, André Zúquete:
An electronic voting system supporting vote weights. Internet Res. 16(5): 507-518 (2006) - Carlos Flavián, Raquel Gurrea:
The choice of digital newspapers: influence of reader goals and user experience. Internet Res. 16(3): 231-247 (2006) - Hsin-Pin Fu, Tien-Hsiang Chang, Pei Chao, Chyou-Huey Chiou:
A collaborative model for service provision by multiple public-sector agencies. Internet Res. 16(4): 365-379 (2006) - Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
Sectet: an extensible framework for the realization of secure inter-organizational workflows. Internet Res. 16(5): 491-506 (2006) - Mamata Jenamani, Pratap K. J. Mohapatra, Sujoy Ghose:
Design benchmarking, user behavior analysis and link-structure personalization in commercial web sites. Internet Res. 16(3): 248-266 (2006) - Evangelia Kavakli, Christos Kalloniatis, Pericles Loucopoulos, Stefanos Gritzalis:
Incorporating privacy requirements into the system design process: The PriS conceptual framework. Internet Res. 16(2): 140-158 (2006) - Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias, Panagiotis Georgiadis:
An incentive-based architecture to enable privacy in dynamic environments. Internet Res. 16(2): 171-189 (2006) - Pradeep K. Korgaonkar, Ronnie Silverblatt, Tulay Girard:
Online retailing, product classifications, and consumer preferences. Internet Res. 16(3): 267-288 (2006) - Pablo Zoghbi Manrique de Lara, Domingo Verano Tacoronte, Jyh-Ming Ting Ding:
Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace Internet misuse. Internet Res. 16(4): 450-467 (2006) - Matthew K. O. Lee, Christy M. K. Cheung, Kai H. Lim, Choon-Ling Sia:
Understanding customer knowledge sharing in web-based discussion boards: An exploratory study. Internet Res. 16(3): 289-303 (2006) - Tom M. Y. Lin, Heng-Hui Wu, Chun-Wei Liao, Tzu-Hsin Liu:
Why are some e-mails forwarded and others not? Internet Res. 16(1): 81-93 (2006) - Katariina Mäenpää:
Clustering the consumers on the basis of their perceptions of the Internet banking services. Internet Res. 16(3): 304-322 (2006) - Evangelos Moustakas, C. Ranganathan, Penny Duquenoy:
E-mail marketing at the crossroads: A stakeholder analysis of unsolicited commercial e-mail (spam). Internet Res. 16(1): 38-52 (2006) - Ana Rosa del Aguila Obra, Antonio Padilla-Meléndez:
Organizational factors affecting Internet technology adoption. Internet Res. 16(1): 94-110 (2006) - Huseyin Cenk Özmutlu, Fatih Çavdur, Seda Özmutlu:
Automatic new topic identification in search engine transaction logs. Internet Res. 16(3): 323-338 (2006) - Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Res. 16(5): 475-490 (2006) - Krzysztof Piotrowski, Peter Langendörfer, Oliver Maye, Zoya Dyka:
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks. Internet Res. 16(2): 159-169 (2006) - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security patterns and requirements for internet-based applications. Internet Res. 16(5): 519-536 (2006) - Jennifer E. Rowley:
An analysis of the e-service literature: towards a research agenda. Internet Res. 16(3): 339-359 (2006) - Carla Ruiz-Mafé, Silvia Sanz-Blas:
Explaining Internet dependency: An exploratory study of future purchase intention of Spanish Internet users. Internet Res. 16(4): 380-397 (2006) - Rong-An Shang, Yu-Chen Chen, Hsueh-Jung Liao:
The value of participation in virtual consumer communities on brand loyalty. Internet Res. 16(4): 398-418 (2006) - Jinqiao Shi, Binxing Fang, Li-Jie Shao:
n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack. Internet Res. 16(2): 213-223 (2006) - Dong Hee Shin:
Distributed inter-organizational systems and innovation processes. Internet Res. 16(5): 553-572 (2006) - Aameek Singh, Bugra Gedik, Ling Liu:
Agyaat: mutual anonymity over structured P2P networks. Internet Res. 16(2): 189-212 (2006) - Amanda Spink, Bernard J. Jansen, Vinish Kathuria, Sherry Koshman:
Overlap among major web search engines. Internet Res. 16(4): 419-426 (2006) - Paula M. C. Swatman, Cornelia C. Krueger, Kornelia van der Beek:
The changing digital content landscape: An evaluation of e-business model development in European online news and music. Internet Res. 16(1): 53-80 (2006) - Yu-Hui Tao, Chu-Chen Rosa Yeh, Sheng-I Sun:
Improving training needs assessment processes via the Internet: system design and qualitative study. Internet Res. 16(4): 427-449 (2006) - Kathryn Waite:
Task scenario effects on bank web site expectations. Internet Res. 16(1): 7-22 (2006)
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 18:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint