ISECS 2008: Guangzhou, China
- Fei Yu, Qi Luo, Yongjun Chen, Zhigang Chen:
Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China. IEEE Computer Society 2008, ISBN 978-0-7695-3258-5
Intelligent Computing
- Yueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan:
The Application of Genetic Algorithm in Vehicle Routing Problem. 3-6 - Kaizhong Jiang, Zhao Lu, Yuan-Qiong Wu, Junzhong Gu:
An Algorithm of Topic Distillation Based on Anchor Text. 11-15 - Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. 16-21 - Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. 22-26 - Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song:
A New Web Text Clustering Algorithm Based on DFSSM. 27-32 - Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu:
Cloud Model-based Data Attributes Reduction for Clustering. 33-36 - Ting Wu, Min Zhang, Xiaoliang Xu, Rongbo Wang:
Improved Algorithm for Tate Pairing Computation. 41-45 - Dazhen Wang, Kwang Mong Sim, Benyun Shi:
A Deadline and Cost Constrained Optimization Algorithm for Scheduling Applications in Grids Based on Proportional Share Systems. 46-50
Web Applications
- Ying Mei, Liangsheng Zhu:
High Efficiency Association Rules Mining Algorithm for Bank Cost Analysis. 57-60 - Qisong Chen, Yun Wu, Xiaowei Chen:
Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVM. 66-70 - Aimin Wang, Jipeng Wang:
The Design and Implementation of the Distribution Resource Planning Management System Based on WEB. 74-77 - Zhaoyang Qu, Hong Gao, Yi Zhu:
Research on High-accuracy Position Prediction Algorithm in Online Game. 78-81 - Jianbin Huang, Heli Sun:
A Reliable Web Service Implementation Approach for Large Commercial Applications. 82-85 - Wu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li:
Study on EAI Based on Web Services and SOA. 95-98 - Hongqi Li, Zhuang Wu, Xiaogang Ji:
Research on the Techniques for Effectively Searching and Retrieving Information from Internet. 99-102
Networks
- Zenggang Xiong, Xuemin Zhang, Jianxin Chen:
Research on Grid Resource Discovery Scheme Integrated P2P Mode. 105-109 - Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang:
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. 110-113 - Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm. 114-117 - GaoJun Fan, Feng Liang, Shiyao Jin:
An Efficient Approach for Point Coverage Problem of Sensor Network. 124-128 - Chunhua Ju, Qibei Lu, Zhongyong Kong:
The Research and Design of Grid-based Business Intelligence Network-BGBIN. 129-132 - Yang Cheng, Zhishu Li, Wei Zhou, Sheng Cai, Peng Zhou:
Design of Network Interface in Distributed Data Acquisition System for E-Commerce. 133-136
Information Processing
- Jianhu Cai, Huanhuan Wang, Gengui Zhou:
Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty. 148-152 - Han-ling Zhang, Shu-yi Wang:
A New Steganalysis Method Using High-pass Filter for JPEG Image. 165-168 - Yi Ren, Zhiting Xiao, Sipei Guo:
An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint. 169-174 - Yali Liu, Xinchun Yin, Liang Qiu:
ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings. 179-183 - Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. 184-188
Machine Learning
- Yang Cheng, Zhishu Li, Peng Zhou, Sheng Chai, Wei Zhou:
Study on Data Enriching Algorithm Based on Rough Set in E-commerce. 199-202 - Xiao-neng Xie, Fei Wu:
Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content Mining. 203-208 - Wenzhe Qi, Chenghui Yang, Jianjun Meng:
Circuit Failure Diagnosis Analysis and Research Based On Neural Network. 209-212 - Quan Zhang, Yahong Li, Jing Huang:
An Entropy-based Approach for Supplier Selection with Interval Information. 213-216 - Li Jian:
An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce. 217-220 - Jun Zhai, Lixin Shen, Yiduo Liang, Jiatao Jiang:
Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce. 221-225 - Jizi Li, Baishun Li, Zhiping Li:
Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement. 230-233
Mobile Commerce
- Decai Meng, Qingfei Min, Yuping Li:
Study on Trust in Mobile Commerce Adoption - A Conceptual Model. 246-249 - Shaojing Fan, Zhongkun He, Yongping Zhang, Hongmei Zhang, Rina Su:
An m-Business Model Based on Session Initiation Protocol. 250-253 - Wang Liang, Guo Yajun, Yan Huifang:
A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System. 254-257 - Qi Yuan, Zhao Xiaokang, Zhang Qiong:
Key Technology and System Design in Mobile Supply Chain Management. 258-262 - Zhihong Li, Minxia Li:
Research on Influencing Factors of Consumer Initial Trust Based on Mobile Commerce. 263-267 - Guoling Lao, Xinwang Wang:
Application Analysis of M-commerce in Digitized Urban Management. 272-275 - Xiang Yi-ming, Chen Qi:
A Study on M-Commerce Industry Development and Market Structure in China. 276-280
Applied Cryptography (I)
- Shan-Qing Guo, Zhong-Hua Zhao:
An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. 283-287 - Guicheng Shen, Xuefeng Zheng:
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. 288-291 - Zemao Chen, Xiaoping Wu, Weimin Tang:
An Executable Code Authorization Model for Secure Operating System. 292-295 - Yang Lu, Jiguo Li, Junmo Xiao:
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. 296-300 - Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of the LCSS RFID Authentication Protocol. 305-309 - Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:
A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing. 314-317 - Jian-min Han, Huiqun Yu, Yu Juan, Ting-ting Cen:
A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation. 318-323
Applied Cryptography (II)
- Qing Zhang, Qiaoyan Wen, Gengli Chen:
Efficient Fair Contract Signing Protocol from Bilinear Pairings. 333-337 - Xinxia Song, Zhigang Chen:
A Distributed Electronic Authentication Scheme in E-Business System. 343-346 - Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai:
A New Image Encryption Algorithm Based on Multiple Chaos System. 347-350 - Bin Jiang, Xijian Ping, Tao Zhang:
Pattern Analysis Applied on Steganalysis for Binary Text Images. 351-354 - Debasis Giri, Parmeshwary Dayal Srivastava:
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. 355-361 - Shangping Wang, Zhiqiang Chen, Xiaofeng Wang:
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. 362-366 - Roy Ng, LinYing Dong:
An Information Assurance Framework on Trusted Autonomic Communications. 367-373
Information Security (I)
- Hung-Min Sun, King-Hang Wang:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. 385-389 - Zhiming Qu, Tongbin Ma, Yunlong Zhang:
Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption. 390-393 - Jian Wang, Jian Gu, Fang Mei, Zhe Zhang, Yanheng Liu:
One New BRAS Model Based on Trusted Network. 398-401 - Zheng Wu, Debao Xiao, Min Xiao, Xi Peng:
Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation. 402-406 - Chunming Tang, Dingyi Pei, Zheng-an Yao:
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. 407-411 - Wenhua Xu, Qianhua He, Yanxiong Li, Tao Li:
Cancelable Voiceprint Templates Based on Knowledge Signatures. 412-415 - Jiandong Liu, Shuhong Wang, Youming Yu:
TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. 432-436
Information Security (II)
- Ling Zhan, Jiguang Wan, Peng Gu:
Metadata Management for Distributed Multimedia Storage System. 443-447 - Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Game Analysis with Penalty Parameter. 453-456 - Wang Shaohui:
Modification and Improvement on Group Signature Scheme without Random Oracles. 462-466 - Jianjun Meng, Chenghui Yang, Wenzhe Qi:
Servicing Work Safety Supervision System for Electric Locomotive Based on Configuration Software. 467-470 - Changqiong Shi, Dawei Wang, Hui Huang, Dafang Zhang:
Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm. 476-481 - Huijuan Lu, Jianguo Chen, Wei Wei:
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. 482-487 - Xiaogang Ji:
Research on the Automatic Summarization Model based on Genetic Algorithm and Mathematical Regression. 488-491 - Siyuan Wu, Zhixing Huang:
A Gossip-based Opinion Diffusion Model via Uninorm Aggregation Operator. 492-496 - Yaling Zhang, Xiaofeng Wang:
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. 497-501 - Liu Wei-Peng, Hu Ju:
A Formal Model of Trust and Security for Task-Oriented Information System. 502-506
Information Security (III)
- Wuwei Li, Yuhong Wang, Ao Chen:
Grey Relational Evaluation on Vendor Selection Based on E-business. 509-513 - Wang Juan, Zhou Yajie, Zhang Huanguo:
The Simplified Inductive Approach to Verifying Security Protocols. 523-526 - Lingyan Bi, Zewei Feng, Min Liu, Weining Wang:
Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code. 527-530 - Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay:
Probability of Attack Based on System Vulnerability Life Cycle. 531-535 - Jianqiang Hu, Feng E. Luo, Jun Li, Xin Tong, Guiping Liao:
SOA-based Enterprise Service Bus. 536-539 - Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang:
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. 540-544 - Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Problem Research Based on Game Theory. 554-557 - Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. 558-561 - Wei Cheng, Zhenhua Tan, Xiaoxing Gao, Guiran Chang, Jia Wen:
High Speed Serial Interface & Some Key Technology Research. 562-566
Risk Analysis
- Chong Wang, Wenkuan Chen, Peiji Shao:
E-business Enterprise Credit Risk Evaluation Based on Markov Chain. 569-572 - Liu Bin, Cui Wentian, Xin Chunlin:
Cash Management and Its Risk Control under No-Stationary Uncertain Demand. 577-581 - Lixia Yang, Xun Liu, Changyong Xu:
Hindrances to the Development of Tourism E-Commerce in China. 588-591 - Junfeng Tian, Tao Liu, Hongqiang Jiao:
Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. 592-598 - Limao Yang, Xuan Tang:
Research of C2C E-Business Trust Evaluation Model Based on Entropy Method. 599-602 - Ranzhe Jing, Jianwei Yu, Zuo Jiang:
Exploring Influencing Factors in E-Commerce Transaction Behaviors. 603-607 - Chen Pang, Xiaofen Ji:
An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel. 608-611 - Jun Yang, Xianze Yang:
Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. 617-622 - Zhang Hong, Liu Lei:
An Abstract Interpretation Frame of the Calculus of Boxed Ambients Based on the Ambient Occurrence Counting. 623-626
Business Process Integration
- Hongju Zhang, Jiajia Liu, Zhijun Yan:
A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity. 629-632 - Yongming Cai, Wei Chen:
General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model. 633-637