Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of University of Electronic Science and Technology of China
1001-0548
2009 Issue z1
Research and Implementation of Storage System in DWMS
zhang long long ; xia xiao ling
..............
page:90-93
Performance Comparison of Multi-Rate System with Role of Anti-Interference and Encryption
liu nan ; li zhen song ; yang dong min
..............
page:97-100
Legal Validity of Electronic Contract and Countermeasures
huang jian hua ; zhao chang liang
..............
page:117-119
Moral Hazard and Reputation Model of B2C Electronic Commerce Intermediary
zhao hong xia ; yang zuo ping
..............
page:83-86
Key Solutions to Public Electronic Payment Security in E-Commerce
du wen cai ; gu jian ; zhou xiao yi
..............
page:34-36,44
Feature Selection in Malware Detection
chen hong quan
..............
page:53-56
Application of Data Mining in Short Message Spam Filtering
shen chao ; huang wei dong
..............
page:21-24
Threshold Identity Authentication Scheme without Trusted Center and It\'s Game Theoretical Analysis
wang li li
..............
page:87-89,100
Application of ECMR Signature in the Mobile Electronic Commerce
zhang li ; yang yong jian
..............
page:25-28
Abstracts of other 60 papers 2
..............
page:11-20
Typical Traffic Abnormal Detection Based on Netflow
tian yang ; wang hong ; chen xiao mei
..............
page:57-60,74
Method of Data Mining in E-Commerce
zhang bao zhong ; zhang dong han ; han ying
..............
page:104-108
Research on E-Commerce Security Based on PKI
zhang lin
..............
page:101-103,108
Analysis on Current Status and Course Design of Business Ethics of Students Majoring in E-Commerce
ke li min
..............
page:120-124
Speech Recognition in the of M-Commerce Security
yang wu jian ; he meng lu
..............
page:69-74
Digital Signature with Encryption Based on Combined Symmetric Key
wu su yan ; li zuo ; hu xiang yi ; du li ping
..............
page:75-78
Cluster-Based Query Expansion for XML Retrieval
huang zi yue ; wan chang xuan
..............
page:29-33
Data Security Management Solutions for Small and Medium-Sized Enterprises
meng xiang xiang ; lan yu jing
..............
page:45-48,52
VAR-Based Method of E-Commerce System Security Risk Quantification
qi wen jing ; zhang jian ; yuan wei hua
..............
page:61-64
Risk Analysis of RFID Networks
wang xiao mei ; zhang chao zuo
..............
page:65-68
Design and Implementation of Web-Based Information Filtering System
wang chun hong ; zhang min ; yang xiu rong
..............
page:79-82
Association Rules Based Network Intrusion Detection Method
chen hong quan ; huo zhi kai
..............
page:94-96
Abstracts of other 60 papers 1
..............
page:1-10
Behaviors of Online Financial Institutions Confronted with Phishing:A Game Theoretic Analysis
liu ye zheng ; ding zheng ping ; yuan yu fei
..............
page:37-44
Security Analysis of University Students Practice Entrepreneurial Website
sun de lin ; xu gao xiang ; huang yuan tong ; fang xiao sheng ; liu pei pei
..............
page:109-112
Access Control Scheme Based on Attribute Certificates for Mobile Agents System
xu da wei ; lv jun
..............
page:113-116
Information Hiding in the Digital Signature
sun yi zuo ; yang wu jian
..............
page:49-52