Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does.
Aleksander MurkoSimon L. R. VrhovecPublished in: CECC (2019)
Keyphrases
- trusted third party
- security services
- credit card
- security mechanisms
- third party
- security protocols
- government services
- personal information
- mobile payment
- digital signature
- key management
- authentication protocol
- internet banking
- perceived risk
- privacy protection
- payment systems
- e government
- resource constrained
- access control
- public key infrastructure
- trust management
- security threats
- trust relationships
- information systems
- content providers
- security requirements
- security issues
- information security
- information technology