


Остановите войну!
for scientists:


default search action
ISECS 2008: Guangzhou, China
- Fei Yu, Qi Luo, Yongjun Chen, Zhigang Chen:
Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China. IEEE Computer Society 2008, ISBN 978-0-7695-3258-5
Intelligent Computing
- Yueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan:
The Application of Genetic Algorithm in Vehicle Routing Problem. 3-6 - Shulin Chen, Lei Wang:
The Algorithm of Obtaining Best Rules Based on Rough Set. 7-10 - Kaizhong Jiang, Zhao Lu, Yuan-Qiong Wu, Junzhong Gu:
An Algorithm of Topic Distillation Based on Anchor Text. 11-15 - Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. 16-21 - Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. 22-26 - Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song
:
A New Web Text Clustering Algorithm Based on DFSSM. 27-32 - Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu:
Cloud Model-based Data Attributes Reduction for Clustering. 33-36 - T. J. Jia:
Construction of Learning Algorithm based on SGA Bayesian Network. 37-40 - Ting Wu, Min Zhang, Xiaoliang Xu, Rongbo Wang:
Improved Algorithm for Tate Pairing Computation. 41-45 - Dazhen Wang, Kwang Mong Sim, Benyun Shi:
A Deadline and Cost Constrained Optimization Algorithm for Scheduling Applications in Grids Based on Proportional Share Systems. 46-50
Web Applications
- Nie Gang:
A Scheme of Workflow Management System Based on Web Services. 53-56 - Ying Mei, Liangsheng Zhu:
High Efficiency Association Rules Mining Algorithm for Bank Cost Analysis. 57-60 - Wenli Dong:
Dynamic Reconfiguration Method for Web Service Based on Policy. 61-65 - Qisong Chen, Yun Wu, Xiaowei Chen:
Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVM. 66-70 - Sheng Chai, Yang Cheng, Jifan Qiu, Wei Zhou:
An XML based Flexible Security E-Commerce Mode. 71-73 - Aimin Wang, Jipeng Wang:
The Design and Implementation of the Distribution Resource Planning Management System Based on WEB. 74-77 - Zhaoyang Qu, Hong Gao, Yi Zhu:
Research on High-accuracy Position Prediction Algorithm in Online Game. 78-81 - Jianbin Huang, Heli Sun
:
A Reliable Web Service Implementation Approach for Large Commercial Applications. 82-85 - Hui Chen, Zheng Li:
The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era. 86-90 - Yi Jiang, Qingling Yue, Zhaogui Qin:
A Novel Constructing Algorithm of E-learning Community. 91-94 - Wu Deng
, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li:
Study on EAI Based on Web Services and SOA. 95-98 - Hongqi Li, Zhuang Wu, Xiaogang Ji:
Research on the Techniques for Effectively Searching and Retrieving Information from Internet. 99-102
Networks
- Zenggang Xiong, Xuemin Zhang, Jianxin Chen:
Research on Grid Resource Discovery Scheme Integrated P2P Mode. 105-109 - Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang:
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. 110-113 - Yejiang Zhang, Zhitang Li, Zhengbing Hu
, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm. 114-117 - Shufen Peng, Jingsha He
, Yao Meng:
Reputation-based Trust Update in Network Environment. 118-123 - GaoJun Fan, Feng Liang, Shiyao Jin:
An Efficient Approach for Point Coverage Problem of Sensor Network. 124-128 - Chunhua Ju, Qibei Lu, Zhongyong Kong:
The Research and Design of Grid-based Business Intelligence Network-BGBIN. 129-132 - Yang Cheng, Zhishu Li, Wei Zhou, Sheng Cai, Peng Zhou:
Design of Network Interface in Distributed Data Acquisition System for E-Commerce. 133-136 - Jingbo Hao, Jianping Yin:
A Preliminary Study of Coordinated Worm Networks. 137-140
Information Processing
- Juan Yang, Yun Bai, Yuhui Qiu:
To Select the Service in Context Aware Systems Using Concept Similarity Mechanism. 143-147 - Jianhu Cai, Huanhuan Wang, Gengui Zhou:
Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty. 148-152 - Huawei Zhao, Wenyu Zhang:
Definitions and Analysis of Integrity in Strand Spaces Model. 153-158 - Wei Zhou, Christoph Meinel:
Enforcing Information Flow Constraints in RBAC Environments. 159-164 - Han-ling Zhang, Shu-yi Wang:
A New Steganalysis Method Using High-pass Filter for JPEG Image. 165-168 - Yi Ren, Zhiting Xiao, Sipei Guo:
An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint. 169-174 - Xiaofeng Zhang:
A New Modeling Method for the Data Analysis Solution in Business. 175-178 - Yali Liu, Xinchun Yin, Liang Qiu:
ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings. 179-183 - Chin-Chen Chang, Chia-Chen Lin
, T. Hoang Ngan Le
, Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. 184-188 - Xu E, Shaocheng Tong, Yuan Wang, Shang Xu, Peng Li:
Approach to Missing Data Recovery. 189-192
Machine Learning
- Shanli Wang:
Research on a New Effective Data Mining Method Based on Neural Networks. 195-198 - Yang Cheng, Zhishu Li, Peng Zhou, Sheng Chai, Wei Zhou:
Study on Data Enriching Algorithm Based on Rough Set in E-commerce. 199-202 - Xiao-neng Xie, Fei Wu:
Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content Mining. 203-208 - Wenzhe Qi, Chenghui Yang, Jianjun Meng:
Circuit Failure Diagnosis Analysis and Research Based On Neural Network. 209-212 - Quan Zhang, Yahong Li, Jing Huang:
An Entropy-based Approach for Supplier Selection with Interval Information. 213-216 - Li Jian:
An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce. 217-220 - Jun Zhai, Lixin Shen, Yiduo Liang, Jiatao Jiang:
Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce. 221-225 - Wei Han, Lingbo Liu, Huaili Zheng:
Dynamic Pricing by Multiagent Reinforcement Learning. 226-229 - Jizi Li, Baishun Li, Zhiping Li:
Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement. 230-233
Mobile Commerce
- Tao Zhou:
The Impact of Perceived Value on User Acceptance of Mobile Commerce. 237-240 - Tao Zhou:
Exploring Mobile User Acceptance Based on UTAUT and Contextual Offering. 241-245 - Decai Meng, Qingfei Min, Yuping Li:
Study on Trust in Mobile Commerce Adoption - A Conceptual Model. 246-249 - Shaojing Fan, Zhongkun He, Yongping Zhang, Hongmei Zhang, Rina Su:
An m-Business Model Based on Session Initiation Protocol. 250-253 - Liang Wang, Yajun Guo, Huifang Yan:
A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System. 254-257 - Qi Yuan, Zhao Xiaokang, Zhang Qiong:
Key Technology and System Design in Mobile Supply Chain Management. 258-262 - Zhihong Li, Minxia Li:
Research on Influencing Factors of Consumer Initial Trust Based on Mobile Commerce. 263-267 - Jin Yan, Li Tong:
Compare and Analysis of Security Strategy in WAP and I-Mode Network. 268-271 - Guoling Lao, Xinwang Wang:
Application Analysis of M-commerce in Digitized Urban Management. 272-275 - Xiang Yi-ming, Chen Qi:
A Study on M-Commerce Industry Development and Market Structure in China. 276-280
Applied Cryptography (I)
- Shan-Qing Guo, Zhong-Hua Zhao:
An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. 283-287 - Guicheng Shen, Xuefeng Zheng:
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. 288-291 - Zemao Chen, Xiaoping Wu, Weimin Tang:
An Executable Code Authorization Model for Secure Operating System. 292-295 - Yang Lu, Jiguo Li, Junmo Xiao:
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. 296-300 - Jianyong Chen, Xiaomin Wang, Liwen He:
An Architecture for Differentiated Security Service. 301-304 - Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of the LCSS RFID Authentication Protocol. 305-309 - Like Chen, Runtong Zhang:
A Key-dependent Cipher DSDP. 310-313 - Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:
A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing. 314-317 - Jian-min Han, Huiqun Yu, Yu Juan, Ting-ting Cen:
A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation. 318-323
Applied Cryptography (II)
- Xiaojun Ye, Lei Jin, Bin Li:
A Multi-Dimensional K-Anonymity Model for Hierarchical Data. 327-332 - Qing Zhang, Qiaoyan Wen, Gengli Chen:
Efficient Fair Contract Signing Protocol from Bilinear Pairings. 333-337 - Shimin Wei, Zepeng Zhuo:
Research on PKI Model Based on NTRU. 338-342 - Xinxia Song, Zhigang Chen:
A Distributed Electronic Authentication Scheme in E-Business System. 343-346 - Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai:
A New Image Encryption Algorithm Based on Multiple Chaos System. 347-350 - Bin Jiang, Xijian Ping, Tao Zhang:
Pattern Analysis Applied on Steganalysis for Binary Text Images. 351-354 - Debasis Giri
, Parmeshwary Dayal Srivastava:
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. 355-361 - Shangping Wang
, Zhiqiang Chen, Xiaofeng Wang:
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. 362-366 - Roy Ng, LinYing Dong:
An Information Assurance Framework on Trusted Autonomic Communications. 367-373
Information Security (I)
- Hu Ruo, Xu Hong:
Independent Coordination Solutions of Dynamic Information Security. 377-380 - Liu Yihe, Tang Nianqing, He Wenxiao:
An Information Security Model Based on P2P Network. 381-384 - Hung-Min Sun, King-Hang Wang
:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. 385-389 - Zhiming Qu, Tongbin Ma, Yunlong Zhang:
Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption. 390-393 - Shigen Shen
, Guangxue Yue:
Unified Certificate Validation System DNS-OCSP. 394-397 - Jian Wang, Jian Gu, Fang Mei, Zhe Zhang, Yanheng Liu:
One New BRAS Model Based on Trusted Network. 398-401 - Zheng Wu, Debao Xiao, Min Xiao, Xi Peng:
Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation. 402-406 - Chunming Tang, Dingyi Pei, Zheng-an Yao:
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. 407-411 - Wenhua Xu, Qianhua He, Yanxiong Li, Tao Li:
Cancelable Voiceprint Templates Based on Knowledge Signatures. 412-415 - Rui Guo, Bosheng Zhou:
Cross Cookie: A Cookie Protocol for Web Mashups. 416-420 - Qiong Wei, Yansheng Lu:
Preservation of Privacy in Publishing Social Network Data. 421-425 - Feng Chen, Jinshu Su
:
A Flexible Approach to Measuring Network Security Using Attack Graphs. 426-431 - Jiandong Liu, Shuhong Wang, Youming Yu:
TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. 432-436
Information Security (II)
- Ding Yong:
Tamper Difficult Technique for Data Residing on Passive Storage. 439-442 - Ling Zhan, Jiguang Wan
, Peng Gu:
Metadata Management for Distributed Multimedia Storage System. 443-447 - Jian He, Mingdi Xu:
Research on Storage Security Based on Trusted Computing Platform. 448-452 - Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Game Analysis with Penalty Parameter. 453-456 - Liqiang Zhang, Huanguo Zhang:
An Introduction to Data Capturing. 457-461 - Shaohui Wang:
Modification and Improvement on Group Signature Scheme without Random Oracles. 462-466 - Jianjun Meng, Chenghui Yang, Wenzhe Qi:
Servicing Work Safety Supervision System for Electric Locomotive Based on Configuration Software. 467-470 - Jun Ye, Zhishu Li, Yanyan Ma:
JSON Based Decentralized SSO Security Architecture in E-Commerce. 471-475 - Changqiong Shi, Dawei Wang, Hui Huang, Dafang Zhang:
Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm. 476-481 - Huijuan Lu, Jianguo Chen, Wei Wei:
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. 482-487 - Xiaogang Ji:
Research on the Automatic Summarization Model based on Genetic Algorithm and Mathematical Regression. 488-491 - Siyuan Wu, Zhixing Huang:
A Gossip-based Opinion Diffusion Model via Uninorm Aggregation Operator. 492-496 - Yaling Zhang, Xiaofeng Wang:
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. 497-501 - Liu Wei-Peng, Hu Ju:
A Formal Model of Trust and Security for Task-Oriented Information System. 502-506
Information Security (III)
- Wuwei Li, Yuhong Wang, Ao Chen:
Grey Relational Evaluation on Vendor Selection Based on E-business. 509-513 - Shaobo Zhong:
Information Intelligent System based on Web Data Mining. 514-517 - Leon Pan:
Using Criterion-Based Access Control for Multilevel Database Security. 518-522 - Juan Wang, Yajie Zhou, Huanguo Zhang:
The Simplified Inductive Approach to Verifying Security Protocols. 523-526 - Lingyan Bi, Zewei Feng, Min Liu, Weining Wang:
Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code. 527-530 - Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay:
Probability of Attack Based on System Vulnerability Life Cycle. 531-535 - Jianqiang Hu, Feng E. Luo, Jun Li, Xin Tong, Guiping Liao:
SOA-based Enterprise Service Bus. 536-539 - Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang:
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. 540-544 - Dong Li, Zhitang Li, Jie Ma:
Processing Intrusion Detection Alerts in Large-scale Network. 545-548 - Zhenhua Wu:
Biometrics Authentication System on Open Network and Security Analysis. 549-553 - Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Problem Research Based on Game Theory. 554-557 - Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. 558-561 - Wei Cheng, Zhenhua Tan, Xiaoxing Gao, Guiran Chang, Jia Wen:
High Speed Serial Interface & Some Key Technology Research. 562-566
Risk Analysis
- Chong Wang, Wenkuan Chen, Peiji Shao:
E-business Enterprise Credit Risk Evaluation Based on Markov Chain. 569-572 - Liu Jindi, Xu Yong:
The Credit Risk Analysis and Prevention of Third Party Payment Platform. 573-576 - Liu Bin, Cui Wentian, Xin Chunlin:
Cash Management and Its Risk Control under No-Stationary Uncertain Demand. 577-581 - Fang Fang, Ye Xin, Xia Yun, Xu Haitao:
An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management. 582-587