Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of University of Electronic Science and Technology of China
1001-0548
2009 Issue z1
Research and Implementation of Storage System in DWMS
zhang long long ; xia xiao ling
..............page:90-93
Performance Comparison of Multi-Rate System with Role of Anti-Interference and Encryption
liu nan ; li zhen song ; yang dong min
..............page:97-100
Legal Validity of Electronic Contract and Countermeasures
huang jian hua ; zhao chang liang
..............page:117-119
Moral Hazard and Reputation Model of B2C Electronic Commerce Intermediary
zhao hong xia ; yang zuo ping
..............page:83-86
Key Solutions to Public Electronic Payment Security in E-Commerce
du wen cai ; gu jian ; zhou xiao yi
..............page:34-36,44
Feature Selection in Malware Detection
chen hong quan
..............page:53-56
Application of Data Mining in Short Message Spam Filtering
shen chao ; huang wei dong
..............page:21-24
Application of ECMR Signature in the Mobile Electronic Commerce
zhang li ; yang yong jian
..............page:25-28
Abstracts of other 60 papers 2
..............page:11-20
Typical Traffic Abnormal Detection Based on Netflow
tian yang ; wang hong ; chen xiao mei
..............page:57-60,74
Method of Data Mining in E-Commerce
zhang bao zhong ; zhang dong han ; han ying
..............page:104-108
Research on E-Commerce Security Based on PKI
zhang lin
..............page:101-103,108
Speech Recognition in the of M-Commerce Security
yang wu jian ; he meng lu
..............page:69-74
Digital Signature with Encryption Based on Combined Symmetric Key
wu su yan ; li zuo ; hu xiang yi ; du li ping
..............page:75-78
Cluster-Based Query Expansion for XML Retrieval
huang zi yue ; wan chang xuan
..............page:29-33
Data Security Management Solutions for Small and Medium-Sized Enterprises
meng xiang xiang ; lan yu jing
..............page:45-48,52
VAR-Based Method of E-Commerce System Security Risk Quantification
qi wen jing ; zhang jian ; yuan wei hua
..............page:61-64
Risk Analysis of RFID Networks
wang xiao mei ; zhang chao zuo
..............page:65-68
Design and Implementation of Web-Based Information Filtering System
wang chun hong ; zhang min ; yang xiu rong
..............page:79-82
Association Rules Based Network Intrusion Detection Method
chen hong quan ; huo zhi kai
..............page:94-96
Abstracts of other 60 papers 1
..............page:1-10
Behaviors of Online Financial Institutions Confronted with Phishing:A Game Theoretic Analysis
liu ye zheng ; ding zheng ping ; yuan yu fei
..............page:37-44
Security Analysis of University Students Practice Entrepreneurial Website
sun de lin ; xu gao xiang ; huang yuan tong ; fang xiao sheng ; liu pei pei
..............page:109-112
Information Hiding in the Digital Signature
sun yi zuo ; yang wu jian
..............page:49-52