Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISECS
ISECS 2009
Generate Citations
Electronic Commerce and Security, International Symposium
May 22 2009 to May 24 2009
Nanchang, China
ISBN: 978-0-7695-3643-9
Volume:
1
1
Table of Contents
Papers
Conference Information - Volume 1
Freely available from IEEE.
pp. xv-xx
Papers
[Copyright notice - Volume 1]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Volume 1
Freely available from IEEE.
pp. v-xiv
Papers
Title Page i - Volume 1
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii
Papers
A P2P Network Authentication Method Based on CPK
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Zhuoming Jiang
,
Rongsheng Xu
Papers
A Robust Remote User Authentication Scheme Using Smart Card
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Bae-Ling Chen
,
Wen-Chung Kuo
,
Lih-Chyau Wuu
Papers
A Trust Model for the SuperPeer-based P2P Files Sharing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-15
by
Lu Gao
,
Zhongmin Li
Papers
Analyzing Cryptographic Protocols Using AI Planning Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-20
by
Yadi Wang
,
Zhiyong Zhou
,
Yu Zhao
,
Jihong Han
Papers
Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Keke Wu
,
Huiyun Li
,
Tingding Chen
,
Fengqi Yu
Papers
Generic Construction of Certificate-Based Encryption in the Standard Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Yang Lu
,
Jiguo Li
Papers
An Extended ACL for Solving Authorization Conflicts
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Chisong Li
,
Zhensong Liao
Papers
Automatic Approach of Provable Security and its Application for OAEP+
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-39
by
Gu Chun-Xiang
,
Guang Yan
,
Chen Nan
,
Zhu Yue-Fei
Papers
Joining Case-Based Reasoning and Item-Based Collaborative Filtering in Recommender Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-42
by
SongJie Gong
Papers
Research and Realization of Trusted Computing Platform Based on EFI
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-46
by
Weiwei Fang
,
Bingru Yang
,
Zheng Peng
,
ZhiGang Tang
Papers
A Uniform Method for Computing the Distance between Ellipsoids
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-51
by
Zhou Zhi Ping
,
Gan Sheng Ke
Papers
A Virtual Enterprise Oriented Access Control Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-59
by
Chunhua Gu
,
Xueqin Zhang
Papers
Evaluating Critical Strategies for Enterprise Resource Planning Systems Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Yan Xu
,
Chung-Hsing Yeh
Papers
Identifying the Dynamic Impact: A Regulatory Perspective on Electronic Money
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Sun Hao
,
Chai Yue Ting
,
Liu Yi
Papers
Micro-payment Protocol Based on Multiple Hash Chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-74
by
Hong Wang
,
Jialin Ma
,
Jing Sun
Research in Enterprise Applications of Dynamic Web Service Composition Methods and Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
Qing-Ming Wang
,
Yong Tang
,
Zan-Bo Zhang
Papers
Research of Tools Rapid Preparation Technology for Aerospace Manufacturing Enterprise
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Fang Yadong
,
Du Laihong
,
Chen Hua
Papers
Transaction Behavior and Volatility of Price Signals in Futures Market
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
Yu Zhao
,
Yu Zhang
,
Chunjie Qi
Papers
WSVR-Based Supplier Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-87
by
Wuling Ren
,
Changmao Lin
Papers
A Case Study on the Supply-chain Reengineering Based on Information Integration of Logistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-92
by
Liwei Bao
,
Yuchi Huang
,
Jijiong Song
,
Yingguang Yang
Papers
Automating Microsoft Office Word in Visual Basic
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-97
by
Hongqi Gong
,
Lihua Li
,
Guangyong Sun
,
Hongyu Zhao
Papers
Design of IAM Function in ERP Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-101
by
Shi-sheng Zhu
,
Tao Wang
,
Ya-jun Deng
,
Xiao-zhu Xie
Papers
A Semantic Service Oriented Architecture for Enterprise Application Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-106
by
Liyi Zhang
,
Si Zhou
,
Mingzhu Zhu
Papers
A Study on IOS Innovation, Interfirm Reengineering and Cooperation Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-111
by
Luchuan Liu
,
Guopeng Yin
Papers
Emipirical Research on Term Structure of Buy-Back Rates Based on EGARCH Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-115
by
Li Ning
,
He Dong-ping
Papers
Evolutionary Game Analysis on the Accounting Information Distortion by Listed Companies
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-119
by
Fangyuan Lu
,
Bingxian Qiu
,
Yunfei Fan
Papers
Flexible Application System Integration Based on Agent-Enabled SOA in the Industrial Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-124
by
Wu Deng
,
Xinhua Yang
Papers
Modeling and Forecast of Operating Capability of Chinese Logistics Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Wang Li-ping
Papers
Study on Information Integration Frame and Key Technique about ERP and E-commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Kong Zaojie
,
Liu Yunsheng
Papers
The Analysis of Government Supervision on Third-party Payment Under Cost-utility Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-137
by
Yiqun Li
,
Xuezheng Zhang
Papers
Research and Implementation on Vocational Career Ladder Plan of Staff in Small and Medium-sized Enterprise of China
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-141
by
Baining Gao
Papers
An Electronic Commerce Security Model Based on SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-145
by
Xin Yu
,
Ping Li
Papers
The Production System Optimizing Simulation in Petrochemical Industry Based on HLA
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-154
by
Dou Zhiwu
,
Li Hongwei
Papers
Anonmity-Revocable Electronic Prosecution Report System
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-160
by
Weidong Qiu
,
Jie Guo
,
Zheng Gong
,
Zheng Huang
Papers
The Development of Inventory Management Information System Based on Workflow Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-165
by
Qiu Xiaoping
,
Du Weifeng
,
Tang Li
,
He Zhenggang
Papers
A Comparison between Block-Based and Non Block-Based Watermarking Schemes Based on DWT
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-173
by
Osamah M. Al-Qershi
,
Khoo Bee Ee
Papers
A Feature-Based Digital Image Watermarking Algorithm Resisting to Geometrical Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-178
by
Tang Wenliang
Papers
A Novel Differential Energy Video Watermarking Based on Watson Visual Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-183
by
Tanfeng Sun
,
Xinghao Jiang
,
Shusen Shi
,
Zhigao Lin
,
Guanglei Fu
Papers
A Novel Audio Watermarking Algorithm for Copyright Protection Based on DCT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-188
by
Yang Yan
,
Huang Rong
,
Xu Mintao
Papers
Hiding Information in Region-Based Wet Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-194
by
Chin-Chen Chang
,
Kuo-Nan Chen
,
Chin-Feng Lee
,
Zhi-Hui Wang
Papers
Research and Implementation of DCT-Based Image Digital Watermarking Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-198
by
Gengming Zhu
,
Shaobo Zhang
Papers
Automatic Video Pattern Recognition Based on Combination of MPEG-7 Descriptors and Second-Prediction Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-202
by
Xinghao Jiang
,
Tanfeng Sun
,
Bin Chen
,
Rongjie Li
,
Bing Feng
Papers
Image Watermarking Based on Wavelet-Based Contourlet Packet Transform with Best Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-207
by
Zhenghua Shu
,
Guodong Liu
,
Lixin Gan
,
Lin Zhan
,
Wenming Fang
Papers
Watermarking Algorithm Based on Curvelet Transform and Human Visual Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
Zhenghua Shu
,
Xiaobao Zhang
,
Guodong Liu
,
Lixin Gan
,
Lin Zhan
Papers
A Blind Watermarking Algorithm Based on Block DCT for Dual Color Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Zhang Yong
,
Lin Li Cai
,
Li Qi Shen
,
Jiang Ze Tao
Papers
A Blind Image Watermarking Scheme Based on Wavelet Tree Quantization
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Peng Liu
,
Zhizhong Ding
Papers
Watermarking Scheme Based on DCT and DHT
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Jianqin Zhou
,
Lingyun He
,
Cheng Shangguan
Papers
A Network Anomaly Detection Method Based on Relative Entropy Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Ya-ling Zhang
,
Zhao-guo Han
,
Jiao-xia Ren
Papers
A Static Method for Detection of Information Theft Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-240
by
JiaJing Li
,
Jian Mao
,
Tao Wei
,
Wei Zou
Papers
A Survey on the Privacy Preserving Algorithm of Association Rule Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-245
by
Yongcheng Luo
,
Yan Zhao
,
Jiajin Le
Papers
Compatible and Usable Mandatory Access Control for Good-enough OS Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-250
by
Zhiyong Shan
Papers
Hierarchical Time-Stamp Protocol: Acquiring Reliable Time-stamp from Local Time Stamping Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-254
by
Xian Pan
,
J.-L. Zheng
Papers
Privacy Compliance Engineering Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-259
by
Xiaojun Ye
,
Zhiwu Zhu
Papers
Detecting and Defending against Worm Attacks Using Bot-honeynet
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-264
by
Yu Yao
,
Jun-wei Lv
,
Fu-xiang Gao
,
Ge Yu
,
Qing-xu Deng
Papers
A Unified Network Security and Fine-Grained Database Access Control Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-269
by
Leon Pan
Papers
Underdetermined Sparse Blind Source Separation by Clustering on Hyperplanes
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-274
by
Beihai Tan
,
Zhao Min
Papers
A Novel Approach for the Maximum Coverage Sets of WSN Based on Immune Clone Selection Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-279
by
WenJie Tian
,
JiCheng Liu
Papers
A Trust Domain-Based Resource Selection Model for Multi-Agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-286
by
Junfeng Tian
,
Juan Li
Papers
Another Efficient Provably Secure Designated Verifier Signature Scheme in the Standard Security Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-291
by
Jianhong Zhang
,
Qin Geng
Papers
Design of a New Web Database Security Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
by
Zhu Yangqing
,
Yu Hui
,
Li Hua
,
Zeng Lianming
Papers
A Secure Model for Electronic Contract Enactment, Monitoring and Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Xiao Yu
,
Yueting Chai
,
Yi Liu
Papers
Research on the Access Control Protocol of WiMAX
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-304
by
Luo Cuilan
Papers
Characterisation of Liquid Properties by Electrical Capacitance Tomography Sensor for Security Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-308
by
Nan Li
,
Bao-long Guo
,
Chuan Huang
Papers
Comparative Assessment of Fingerprint Sample Quality Measures Based on Minutiae-Based Matching Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-313
by
Changlong Jin
,
Hakil Kim
,
Xuenan Cui
,
Eunsoo Park
,
Junchul Kim
,
Jinsoo Hwang
,
Stephen Elliott
The Analysis of Knowledge Management's Functions in E- Commerce Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-393
by
Zhu Mingqiang
,
Zou Zuxu
Papers
Palmprint Verification Based on Specific-user
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-317
by
Ning Du
,
Miao Qi
,
Yinan Zhang
,
Jun Kong
Papers
Security Protocol Analysis Based on Rewriting Approximation
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Nan Liu
,
Wen-ye Zhu
,
Yue-fei Zhu
Papers
Study on the Network Service Status's Detection and Recovery Strategy Based on Cloud Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-327
by
Chen Lin
,
Zhang Shi-bin
,
Li Li
Papers
Subjective Trust Evaluation Model Based on Fuzzy Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Zhang Shibin
,
Sun Xiang
,
Qin Zhi
Papers
Research on the Method of Destroying Classified Information Carriers
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-337
by
Yanmei Lv
,
Gefang Wang
,
Jiangsheng Sun
,
Dongqing Liu
Papers
Development of ISEE: An Information Security Engineering Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-342
by
Daisuke Horie
,
Yuichi Goto
,
Jingde Cheng
Papers
A Novel Approach for Vehicle-logo Location Based on Edge Detection and Morphological Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-345
by
Wenju Li
,
Ling Li
Papers
E-Mail Address Privacy via PEA's (Proxy E-Mails Accounts)
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-351
by
Syed Rahman Mashwani
,
Shah Khusro
,
A. Min Tjoa
Papers
An Approach to Integrating the User Credit Values on Multiple E-Commerce Websites
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-359
by
Xiao Wei
,
Shunxiang Zhang
An Exploratory Study on E-Commerce Strategy in Small and Medium Sized Enterprises: An Ecological Niches View
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-364
by
Shen Chenglin
,
Zhang Xinxin
Papers
Camparation of Logistics Organization Models under the Circumstance of E-commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-368
by
Fang Huang
,
Songdong Ju
Papers
Dynamic Supplying Desired Web Service for E-Business
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-373
by
Xuejuan Huang
,
Xinmeng Chen
,
Jiazhen Xu
,
Jie Yang
Papers
E-Commerce in the Textile and Apparel Supply Chain Management: Framework and Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-378
by
Wang Jinfu
,
Zhang Aixiang
Papers
Intermediating Effect of Knowledge Sharing between Virtual Community System Design and E-commerce Trust: An Empirical Study from China
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
Guilin Zhou
Papers
Research on Third-party B2B E-marketplaces Service Orientation from Global Production Networks Embeddedness of SMEs Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-389
by
Baoliang Hu
Papers
The Research of Security Technology on E-commerce Based on the Second Generation Identity ID Card and Fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-397
by
Minwei He
Papers
Intelligence Computing Methods in Electronic Commerce and Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-402
by
Jing Zhang
Papers
Application of Comprehensive Fuzzy Evaluation in Assessing Strategies of E-Commerce Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-407
by
Qu Zhiming
,
Li Jinxian
Papers
Application of GRID Computating and Workflow Technology in E-Commerce Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-412
by
Qu Zhiming
,
Li Jinxian
Papers
Application of PCFA in Assessing Security Technique in E-Commerce Affairs
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-417
by
Qu Zhiming
,
Li Jinxian
Papers
Examining the Effect of E-commerce Website Quality on User Satisfaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-421
by
Tao Zhou
,
Shuren Zhang
Papers
The Application of XML Security Technology in E-commerce System
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-425
by
Yang Song
Papers
A Value-Oriented Framework of Business Models Innovation
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-430
by
Qiuying Chen
Papers
The Research on Chinese Taxation Policies Based on E-commerce Model Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-434
by
Yiming Xiang
,
Yun Ling
Papers
BCM Mechanism Based on Infinite-horizon Growth Model in E-commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-438
by
Gang Chen
Papers
A Finite Element Mesh Generation Algorithm and Application to Human Head Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-443
by
Jun Liu
,
Jiexian Zeng
Papers
A New Adaptive Genetic Neural Network Based Active Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-447
by
Yan Ying-fu
,
Wen Hui
Papers
A Reliability Measurement Method for Service in Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-452
by
Yunfa Li
,
Pengliu Tan
Papers
A Search Algorithm Based on Referral Trust in Unstructured P2P Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-457
by
Wang Ping
,
Qiu Jing
,
Qiu Yu Hui
Improvement of Chord Routing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-525
by
Biqing Wang
Showing 100 out of 145
Load More
Load All