Sign in
ISECS
2008
2008
2008
Keyphrases
Publications
2008
Na Li
,
Xiaoshi Zheng
,
Yanling Zhao
,
Huimin Wu
,
Shifeng Li
Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform.
ISECS
(2008)
Yan Li
The Research on Multi-agent Framework for Decision Support System and Its Application.
ISECS
(2008)
Hongli Wang
Research on Representation of Preference of Negotiator in Negotiation Support System.
ISECS
(2008)
Wenhua Xu
,
Qianhua He
,
Yanxiong Li
,
Tao Li
Cancelable Voiceprint Templates Based on Knowledge Signatures.
ISECS
(2008)
Shulin Chen
,
Lei Wang
The Algorithm of Obtaining Best Rules Based on Rough Set.
ISECS
(2008)
Shahriar Mohammadi
,
Sanaz Abedi
ECC-Based Biometric Signature: A New Approach in Electronic Banking Security.
ISECS
(2008)
Xing Wan
,
Lei Huang
Research on e-Commerce Application Architecture Based on the Integration of Workflow and Agile Service.
ISECS
(2008)
Jun Ye
,
Zhishu Li
,
Yanyan Ma
JSON Based Decentralized SSO Security Architecture in E-Commerce.
ISECS
(2008)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Dexiang Zhang
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
ISECS
(2008)
Wenli Dong
Test Case Reduction Technique for BPEL-based Testing.
ISECS
(2008)
Mina Deng
,
Bart Preneel
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity.
ISECS
(2008)
Shouqiang Liu
,
Deyu Qi
,
Jun Xiang
,
Baogang Chen
Research and Design on Reputation Services (RS) System.
ISECS
(2008)
Jian Wang
,
Jian Gu
,
Fang Mei
,
Zhe Zhang
,
Yanheng Liu
One New BRAS Model Based on Trusted Network.
ISECS
(2008)
Yang Cheng
,
Zhishu Li
,
Peng Zhou
,
Sheng Chai
,
Wei Zhou
Study on Data Enriching Algorithm Based on Rough Set in E-commerce.
ISECS
(2008)
Lihua Ruan
,
Ding Tian
A Research of Trust Based on E-Commerce.
ISECS
(2008)
Liu Yihe
,
Tang Nianqing
,
He Wenxiao
An Information Security Model Based on P2P Network.
ISECS
(2008)
Guicheng Shen
,
Xuefeng Zheng
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce.
ISECS
(2008)
Delin Hou
,
Huosong Xia
Application of Streaming Media Technology in Electronic Commerce.
ISECS
(2008)
Yang Cheng
,
Zhishu Li
,
Wei Zhou
,
Sheng Cai
,
Peng Zhou
Design of Network Interface in Distributed Data Acquisition System for E-Commerce.
ISECS
(2008)
Huajun Huang
,
Shaohong Zhong
,
Xingming Sun
Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics.
ISECS
(2008)
Wu Deng
,
Xinhua Yang
,
Huimin Zhao
,
Dan Lei
,
Hua Li
Study on EAI Based on Web Services and SOA.
ISECS
(2008)
Hu Ruo
,
Xu Hong
Independent Coordination Solutions of Dynamic Information Security.
ISECS
(2008)
Sheng Chai
,
Yang Cheng
,
Jifan Qiu
,
Wei Zhou
An XML based Flexible Security E-Commerce Mode.
ISECS
(2008)
Roy Ng
,
LinYing Dong
An Information Assurance Framework on Trusted Autonomic Communications.
ISECS
(2008)
Li Yu
,
Xiaoping Yang
,
Qian Li
Recommender Oriented to Complicate Task in E-commerce.
ISECS
(2008)
Huawei Zhao
,
Wenyu Zhang
Definitions and Analysis of Integrity in Strand Spaces Model.
ISECS
(2008)
Min Liu
Optimization of an Indicator System for Measuring E-Business: An Empirical Study by Firms.
ISECS
(2008)
Zhenhua Wu
Biometrics Authentication System on Open Network and Security Analysis.
ISECS
(2008)
Hua Jiang
Study on Mobile E-commerce Security Payment System.
ISECS
(2008)
Yun-he Li
,
Shan-yu Wu
Research on a New E-voting Method based on the Cellular Phone.
ISECS
(2008)
Jun Zhai
,
Lixin Shen
,
Yiduo Liang
,
Jiatao Jiang
Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce.
ISECS
(2008)
Jianquan Xie
,
Chunhua Yang
,
Dazu Huang
,
Duosi Xie
A Large Capacity Blind Information Hiding Algorithm.
ISECS
(2008)
Liqiang Zhang
,
Huanguo Zhang
An Introduction to Data Capturing.
ISECS
(2008)
Hung-Min Sun
,
King-Hang Wang
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
ISECS
(2008)
Mehdi Fasanghari
Assessing the Impact of Information Technology on Supply Chain Management.
ISECS
(2008)
Qingying Zhang
,
Weihong Yue
,
Chengfang Wang
Research on the Application of CSCW in Shipbuilding Industry.
ISECS
(2008)
Zhu Haibo
Analysis of Electronic Innovation of Securities Trading in China using a Hypercube Model.
ISECS
(2008)
Liaojun Pang
,
Huixian Li
,
Ye Yao
,
Yumin Wang
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
ISECS
(2008)
Tianjie Cao
,
Peng Shen
,
Elisa Bertino
Cryptanalysis of the LCSS RFID Authentication Protocol.
ISECS
(2008)
Li Yu
,
Ming Dong
,
Rong Wang
Taxonomy for Personalized Recommendation Service.
ISECS
(2008)
Junfeng Tian
,
Tao Liu
,
Hongqiang Jiao
Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems.
ISECS
(2008)
Guoling Lao
,
Xinwang Wang
Application Analysis of M-commerce in Digitized Urban Management.
ISECS
(2008)
Chin-Chen Chang
,
The Duc Kieu
,
Yung-Chen Chou
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
ISECS
(2008)
Shuliang Zhao
,
Haifeng Liu
,
Zhaohao Sun
Scalable Trust in Multi-agent E-commerce System.
ISECS
(2008)
Wei Sun
,
Xiangwei Kong
,
Dequan He
,
Xingang You
Information Security Problem Research Based on Game Theory.
ISECS
(2008)
Peizhi Wang
,
Xinying Liu
,
Wenbo Li
Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China.
ISECS
(2008)
Yang Lu
,
Jiguo Li
,
Junmo Xiao
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
ISECS
(2008)
Juan Yang
,
Yun Bai
,
Yuhui Qiu
To Select the Service in Context Aware Systems Using Concept Similarity Mechanism.
ISECS
(2008)
Dong Li
,
Zhitang Li
,
Jie Ma
Processing Intrusion Detection Alerts in Large-scale Network.
ISECS
(2008)
Jizi Li
,
Baishun Li
,
Zhiping Li
Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement.
ISECS
(2008)