Default Cover Image

Electronic Commerce and Security, International Symposium

May 22 2009 to May 24 2009

Nanchang, China

ISBN: 978-0-7695-3643-9

Volume:

Table of Contents

Papers
Conference Information - Volume 1Freely available from IEEE.pp. xv-xx
Papers
[Copyright notice - Volume 1]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 1Freely available from IEEE.pp. v-xiv
Papers
Title Page i - Volume 1Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 1Freely available from IEEE.pp. iii
Papers
A P2P Network Authentication Method Based on CPKFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
A Robust Remote User Authentication Scheme Using Smart CardFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Papers
A Trust Model for the SuperPeer-based P2P Files Sharing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 12-15
Papers
Analyzing Cryptographic Protocols Using AI Planning TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 16-20
Papers
Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical WorkFull-text access may be available. Sign in or learn about subscription options.pp. 21-24
Papers
Generic Construction of Certificate-Based Encryption in the Standard ModelFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
Papers
An Extended ACL for Solving Authorization ConflictsFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
Papers
Automatic Approach of Provable Security and its Application for OAEP+Full-text access may be available. Sign in or learn about subscription options.pp. 35-39
Papers
Joining Case-Based Reasoning and Item-Based Collaborative Filtering in Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 40-42
Papers
Research and Realization of Trusted Computing Platform Based on EFIFull-text access may be available. Sign in or learn about subscription options.pp. 43-46
Papers
A Uniform Method for Computing the Distance between EllipsoidsFull-text access may be available. Sign in or learn about subscription options.pp. 47-51
Papers
A Virtual Enterprise Oriented Access Control MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 55-59
Papers
Evaluating Critical Strategies for Enterprise Resource Planning Systems ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Papers
Identifying the Dynamic Impact: A Regulatory Perspective on Electronic MoneyFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Papers
Micro-payment Protocol Based on Multiple Hash ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 71-74
Research in Enterprise Applications of Dynamic Web Service Composition Methods and ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Papers
Research of Tools Rapid Preparation Technology for Aerospace Manufacturing EnterpriseFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Papers
Transaction Behavior and Volatility of Price Signals in Futures MarketFull-text access may be available. Sign in or learn about subscription options.pp. 79-83
Papers
WSVR-Based Supplier SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 84-87
Papers
A Case Study on the Supply-chain Reengineering Based on Information Integration of LogisticsFull-text access may be available. Sign in or learn about subscription options.pp. 88-92
Papers
Automating Microsoft Office Word in Visual BasicFull-text access may be available. Sign in or learn about subscription options.pp. 93-97
Papers
Design of IAM Function in ERP SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 98-101
Papers
A Semantic Service Oriented Architecture for Enterprise Application IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 102-106
Papers
A Study on IOS Innovation, Interfirm Reengineering and Cooperation PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 107-111
Papers
Emipirical Research on Term Structure of Buy-Back Rates Based on EGARCH ModelFull-text access may be available. Sign in or learn about subscription options.pp. 112-115
Papers
Evolutionary Game Analysis on the Accounting Information Distortion by Listed CompaniesFull-text access may be available. Sign in or learn about subscription options.pp. 116-119
Papers
Flexible Application System Integration Based on Agent-Enabled SOA in the Industrial FieldFull-text access may be available. Sign in or learn about subscription options.pp. 120-124
Papers
Modeling and Forecast of Operating Capability of Chinese Logistics IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 125-128
Papers
Study on Information Integration Frame and Key Technique about ERP and E-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Papers
The Analysis of Government Supervision on Third-party Payment Under Cost-utility ModelFull-text access may be available. Sign in or learn about subscription options.pp. 133-137
Papers
Research and Implementation on Vocational Career Ladder Plan of Staff in Small and Medium-sized Enterprise of ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
Papers
An Electronic Commerce Security Model Based on SOAFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
Papers
The Production System Optimizing Simulation in Petrochemical Industry Based on HLAFull-text access may be available. Sign in or learn about subscription options.pp. 151-154
Papers
Anonmity-Revocable Electronic Prosecution Report SystemFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Papers
The Development of Inventory Management Information System Based on Workflow TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Papers
A Comparison between Block-Based and Non Block-Based Watermarking Schemes Based on DWTFull-text access may be available. Sign in or learn about subscription options.pp. 169-173
Papers
A Feature-Based Digital Image Watermarking Algorithm Resisting to Geometrical AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 174-178
Papers
A Novel Differential Energy Video Watermarking Based on Watson Visual ModelFull-text access may be available. Sign in or learn about subscription options.pp. 179-183
Papers
A Novel Audio Watermarking Algorithm for Copyright Protection Based on DCT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 184-188
Papers
Hiding Information in Region-Based Wet ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
Papers
Research and Implementation of DCT-Based Image Digital Watermarking AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
Papers
Automatic Video Pattern Recognition Based on Combination of MPEG-7 Descriptors and Second-Prediction StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 199-202
Papers
Image Watermarking Based on Wavelet-Based Contourlet Packet Transform with Best TreeFull-text access may be available. Sign in or learn about subscription options.pp. 203-207
Papers
Watermarking Algorithm Based on Curvelet Transform and Human Visual ModelFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Papers
A Blind Watermarking Algorithm Based on Block DCT for Dual Color ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
A Blind Image Watermarking Scheme Based on Wavelet Tree QuantizationFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Papers
Watermarking Scheme Based on DCT and DHTFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Papers
A Network Anomaly Detection Method Based on Relative Entropy TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
Papers
A Static Method for Detection of Information Theft MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 236-240
Papers
A Survey on the Privacy Preserving Algorithm of Association Rule MiningFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
Papers
Compatible and Usable Mandatory Access Control for Good-enough OS SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 246-250
Papers
Hierarchical Time-Stamp Protocol: Acquiring Reliable Time-stamp from Local Time Stamping ServerFull-text access may be available. Sign in or learn about subscription options.pp. 251-254
Papers
Privacy Compliance Engineering ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 255-259
Papers
Detecting and Defending against Worm Attacks Using Bot-honeynetFull-text access may be available. Sign in or learn about subscription options.pp. 260-264
Papers
A Unified Network Security and Fine-Grained Database Access Control ModelFull-text access may be available. Sign in or learn about subscription options.pp. 265-269
Papers
Underdetermined Sparse Blind Source Separation by Clustering on HyperplanesFull-text access may be available. Sign in or learn about subscription options.pp. 270-274
Papers
A Novel Approach for the Maximum Coverage Sets of WSN Based on Immune Clone Selection AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 275-279
Papers
A Trust Domain-Based Resource Selection Model for Multi-AgentFull-text access may be available. Sign in or learn about subscription options.pp. 280-286
Papers
Another Efficient Provably Secure Designated Verifier Signature Scheme in the Standard Security ModelFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Papers
Design of a New Web Database Security ModelFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
Papers
A Secure Model for Electronic Contract Enactment, Monitoring and ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Papers
Research on the Access Control Protocol of WiMAXFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
Papers
Characterisation of Liquid Properties by Electrical Capacitance Tomography Sensor for Security ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 305-308
The Analysis of Knowledge Management's Functions in E- Commerce ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Papers
Palmprint Verification Based on Specific-userFull-text access may be available. Sign in or learn about subscription options.pp. 314-317
Papers
Security Protocol Analysis Based on Rewriting ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Papers
Study on the Network Service Status's Detection and Recovery Strategy Based on Cloud ModelFull-text access may be available. Sign in or learn about subscription options.pp. 323-327
Papers
Subjective Trust Evaluation Model Based on Fuzzy ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 328-332
Papers
Research on the Method of Destroying Classified Information CarriersFull-text access may be available. Sign in or learn about subscription options.pp. 333-337
Papers
Development of ISEE: An Information Security Engineering EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
Papers
A Novel Approach for Vehicle-logo Location Based on Edge Detection and Morphological FilterFull-text access may be available. Sign in or learn about subscription options.pp. 343-345
Papers
E-Mail Address Privacy via PEA's (Proxy E-Mails Accounts)Full-text access may be available. Sign in or learn about subscription options.pp. 346-351
Papers
An Approach to Integrating the User Credit Values on Multiple E-Commerce WebsitesFull-text access may be available. Sign in or learn about subscription options.pp. 355-359
An Exploratory Study on E-Commerce Strategy in Small and Medium Sized Enterprises: An Ecological Niches ViewFull-text access may be available. Sign in or learn about subscription options.pp. 360-364
Papers
Camparation of Logistics Organization Models under the Circumstance of E-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 365-368
Papers
Dynamic Supplying Desired Web Service for E-BusinessFull-text access may be available. Sign in or learn about subscription options.pp. 369-373
Papers
E-Commerce in the Textile and Apparel Supply Chain Management: Framework and Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 374-378
Papers
Intermediating Effect of Knowledge Sharing between Virtual Community System Design and E-commerce Trust: An Empirical Study from ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Papers
Research on Third-party B2B E-marketplaces Service Orientation from Global Production Networks Embeddedness of SMEs PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 385-389
Papers
The Research of Security Technology on E-commerce Based on the Second Generation Identity ID Card and FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 394-397
Papers
Intelligence Computing Methods in Electronic Commerce and SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 398-402
Papers
Application of Comprehensive Fuzzy Evaluation in Assessing Strategies of E-Commerce PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 403-407
Papers
Application of GRID Computating and Workflow Technology in E-Commerce LearningFull-text access may be available. Sign in or learn about subscription options.pp. 408-412
Papers
Application of PCFA in Assessing Security Technique in E-Commerce AffairsFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Papers
Examining the Effect of E-commerce Website Quality on User SatisfactionFull-text access may be available. Sign in or learn about subscription options.pp. 418-421
Papers
The Application of XML Security Technology in E-commerce SystemFull-text access may be available. Sign in or learn about subscription options.pp. 422-425
Papers
A Value-Oriented Framework of Business Models InnovationFull-text access may be available. Sign in or learn about subscription options.pp. 426-430
Papers
The Research on Chinese Taxation Policies Based on E-commerce Model ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 431-434
Papers
BCM Mechanism Based on Infinite-horizon Growth Model in E-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 435-438
Papers
A Finite Element Mesh Generation Algorithm and Application to Human Head ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 441-443
Papers
A New Adaptive Genetic Neural Network Based Active EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 444-447
Papers
A Reliability Measurement Method for Service in GridFull-text access may be available. Sign in or learn about subscription options.pp. 448-452
Papers
A Search Algorithm Based on Referral Trust in Unstructured P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 453-457
Improvement of Chord Routing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 523-525
Showing 100 out of 145