派博傳思國際中心

標題: Titlebook: E-Commerce and Web Technologies; 4th International Co Kurt Bauknecht,A Min Tjoa,Gerald Quirchmayr Conference proceedings 2003 Springer-Verl [打印本頁]

作者: coerce    時間: 2025-3-21 19:57
書目名稱E-Commerce and Web Technologies影響因子(影響力)




書目名稱E-Commerce and Web Technologies影響因子(影響力)學科排名




書目名稱E-Commerce and Web Technologies網(wǎng)絡公開度




書目名稱E-Commerce and Web Technologies網(wǎng)絡公開度學科排名




書目名稱E-Commerce and Web Technologies被引頻次




書目名稱E-Commerce and Web Technologies被引頻次學科排名




書目名稱E-Commerce and Web Technologies年度引用




書目名稱E-Commerce and Web Technologies年度引用學科排名




書目名稱E-Commerce and Web Technologies讀者反饋




書目名稱E-Commerce and Web Technologies讀者反饋學科排名





作者: Arroyo    時間: 2025-3-21 22:15

作者: 軟弱    時間: 2025-3-22 02:57

作者: Dorsal-Kyphosis    時間: 2025-3-22 06:52

作者: 貪心    時間: 2025-3-22 09:16

作者: homocysteine    時間: 2025-3-22 15:56

作者: homocysteine    時間: 2025-3-22 18:09
A Security Architecture for Reputation Systemsotected from manipulation. Motivated by such needs a security architecture for reputation systems is proposed. Within the architecture several services are identified. In addition, the mechanisms and parameters to support the identified services are also determined.
作者: frozen-shoulder    時間: 2025-3-22 22:09

作者: FLIT    時間: 2025-3-23 02:41
Conference proceedings 2003ns. The papers are organized in topical sections on auctions, security, agents and search, ebXML, modeling and technology, XML, design and performance, business processes, and brokering and recommender systems..
作者: 留戀    時間: 2025-3-23 06:09

作者: 禮節(jié)    時間: 2025-3-23 13:06
conjunctive combinatorial bids that allows formulation of some fairness properties applicable when pricing is based solely on the buyer’s bids. We then give an example payment allocation algorithm that implements these properties.
作者: 全國性    時間: 2025-3-23 14:48

作者: 合群    時間: 2025-3-23 18:13
0302-9743 ptember 2003....The 42 revised full papers presented together with an invited paper and a position paper were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on auctions, security, agents and search, ebXML, modeling and technology, XML, design and p
作者: 惹人反感    時間: 2025-3-23 23:11
, digital goods have in common, that transaction costs are minimal (in comparison to conventional goods) since all logistic processes may happen consistent without changing the media of the Internet. This includes costs for information, arrangements, transaction, controlling and adapting of the bargain.
作者: 百科全書    時間: 2025-3-24 05:06
need for an internet charity donation scheme, identify the security requirements such a scheme should fulfill, and propose a scheme that uses an anonymous electronic cash technique to make donations, and that employs smart cards for donation distribution. Finally, we analyse how the proposed scheme matches the identified security requirements.
作者: GIST    時間: 2025-3-24 09:31
existing mobile secure mechanism, because anonymity on mobile payment transaction can be misused by attacker. Therefore, we propose tamper-proof smart card based efficient secure mobile e-coins with .
作者: 敲詐    時間: 2025-3-24 13:42
mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed ET-RBAC by applying it to an example of M-commerce service.
作者: erythema    時間: 2025-3-24 15:14
Current Chinese Economic Report Seriessolve the bid evaluation problem in an automated contracting environment. This research endeavors to offer a better alternative to the solution of the bid evaluation problem by adopting the genetic local search (GLS) method.
作者: 極小    時間: 2025-3-24 19:19

作者: Mirage    時間: 2025-3-25 01:15
otected from manipulation. Motivated by such needs a security architecture for reputation systems is proposed. Within the architecture several services are identified. In addition, the mechanisms and parameters to support the identified services are also determined.
作者: municipality    時間: 2025-3-25 05:41
ead of modifying web services engine. It also supports extensibility since it has been developed based on international standards such as WS-Security, XKMS, XML Encryption, and XML Signature specifications. The proposed solution provides clients and servers in the business to business environments with confidence and security.
作者: 有雜色    時間: 2025-3-25 07:56
h the GSM subscriber identity in such a way that without a mobile station, in particular the SIM, and the corresponding debit/credit card, an unscrupulous user will find it difficult to make a fraudulent payment at the expense of the legitimate cardholder. This is achieved in such a way that no management overhead is imposed on the user.
作者: hemorrhage    時間: 2025-3-25 15:28

作者: Decrepit    時間: 2025-3-25 19:24

作者: 感激小女    時間: 2025-3-25 21:14

作者: Gnrh670    時間: 2025-3-26 02:25
er can include several business rules and purchasing policies as side constraints in the optimization problem to evaluate the winning bids. We propose the use of goal programming techniques to solve the bid evaluation problem.
作者: machination    時間: 2025-3-26 07:20
total revenue. This variant of a Dutch auction guarantees that the sum of the face value of all used coupons will be less than (or equal to) the increase in the revenue caused by their use. As a result the realized revenue will be higher than the revenue received in a typical Dutch auction with the same settings.
作者: 斗爭    時間: 2025-3-26 11:40

作者: Orgasm    時間: 2025-3-26 16:34

作者: 占卜者    時間: 2025-3-26 20:26

作者: 水土    時間: 2025-3-27 00:46

作者: Pastry    時間: 2025-3-27 05:07

作者: VEST    時間: 2025-3-27 09:09

作者: osteoclasts    時間: 2025-3-27 12:00

作者: 笨重    時間: 2025-3-27 13:48

作者: 載貨清單    時間: 2025-3-27 18:56

作者: Instantaneous    時間: 2025-3-28 01:11
https://doi.org/10.1007/b11826B2B; Distribution; E-Business; Mobile Payment; Signatur; XML; business process; e-auctions; e-commerce; e-com
作者: municipality    時間: 2025-3-28 05:18
978-3-540-40808-6Springer-Verlag Berlin Heidelberg 2003
作者: nonplus    時間: 2025-3-28 10:09
E-Commerce and Web Technologies978-3-540-45229-4Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 不透明性    時間: 2025-3-28 10:36

作者: 食草    時間: 2025-3-28 18:06

作者: 建筑師    時間: 2025-3-28 20:22

作者: trigger    時間: 2025-3-29 00:43
able of clearing combinatorial exchanges. The Vickrey-Groves-Clarke mechanism, which has been successfully applied in the case of one-sided combinatorial auctions, is not budget-balanced when generalized to two-sided auctions. We present a new model for an auction market with autonomous traders and
作者: Chromatic    時間: 2025-3-29 04:13
vices and matchmaking facilities and explains why directories such as UDDI are important but insufficient for web services and need to be complemented with advanced matchmaking facilities. It discusses the requirements that web services place on matchmaking, namely symmetry of information exchange,
作者: 小隔間    時間: 2025-3-29 08:09
anonymity requirements of many donors, however, make the existing means of donation inappropriate for them. In this paper we investigate the business need for an internet charity donation scheme, identify the security requirements such a scheme should fulfill, and propose a scheme that uses an anony
作者: 畫布    時間: 2025-3-29 13:08

作者: TAIN    時間: 2025-3-29 16:20

作者: 尖叫    時間: 2025-3-29 19:47
paper we propose ET-RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are
作者: murmur    時間: 2025-3-30 00:50
and certificate revocation services, although very costly in practice, must be available to prevent big loss due to compromising of the signing key. In this paper, we employ a revocation-free public-key framework to improve the efficiency in maintaining the validity of digital signatures as non-rep
作者: hematuria    時間: 2025-3-30 04:05

作者: CHART    時間: 2025-3-30 11:15
https://doi.org/10.1057/978-1-137-59605-5rtunities to business of all sizes as well as convenience to consumers. These benefits are not reaped without danger for merchants and consumers. When a purchase list or an invoice is created it may get infected with some modification by intruder before the signature is attached to it. We proposed a
作者: 鍵琴    時間: 2025-3-30 15:21

作者: Ischemia    時間: 2025-3-30 17:45

作者: Range-Of-Motion    時間: 2025-3-30 23:10
g focused on as the leading electronic commerce framework. The adoption of standards such as ebXML is probably the best way to achieve interoperability among electronic commerce systems, and more and more e-Business solutions around the world are supporting ebXML. This work primarily discusses the c
作者: 抓住他投降    時間: 2025-3-31 04:08

作者: 工作    時間: 2025-3-31 08:39

作者: 水獺    時間: 2025-3-31 10:53

作者: filicide    時間: 2025-3-31 16:01

作者: 傲慢物    時間: 2025-3-31 20:41
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300066.jpg
作者: Aspirin    時間: 2025-4-1 01:01

作者: 無王時期,    時間: 2025-4-1 04:08

作者: 善變    時間: 2025-4-1 06:25
ebIOP: An ebXML Compliant B2B Interoperability Platformrmation Model (ebRIM) to describe a registry/repository that provides a classification mechanism to achieve partner discovery..Currently, there exists many B2B standards each provide competing and complementary solutions to B2B interoperability. So, there is a need for serving implementation of thes
作者: 榨取    時間: 2025-4-1 11:22

作者: 連鎖    時間: 2025-4-1 17:09





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
宁晋县| 吴忠市| 徐水县| 黄梅县| 沿河| 全椒县| 温宿县| 荃湾区| 鄂托克旗| 保康县| 吉水县| 辽中县| 化隆| 玛曲县| 泽库县| 龙井市| 佛学| 武山县| 满洲里市| 抚顺市| 罗田县| 湟源县| 海盐县| 钦州市| 定襄县| 临湘市| 镇雄县| 项城市| 佛坪县| 长宁区| 惠来县| 玉门市| 景洪市| 乌兰察布市| 肃南| 红桥区| 南通市| 永济市| 宜兰市| 青神县| 长宁县|