Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《East China Economic Management》 2000-04
Add to Favorite Get Latest Update

An analysis for the security of electronic business

WANG Xiao-jun,TANG Zheng-qing (Anhui Industry and Commerce Administration School,Hefei 230059,China)  
The security of electronic business is being confronted with a series of severe challenges along with the rapid development of electronic commerce,to establish the system of secure electronic business and to improve the safety of data transfer are the urgent demands of the normal development of electronic commerce.
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Zhao Jing; Hu Yunfa; Li Liyan(Department of Computer Science, Fudan University, Shanghai 200433);The Security Protocols Used in On-line Purchase of E-commerce--SSL and SET[J];Computer Engineering;1999-12
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHENG Ming yang (Dept. of Information Engineering,Changchun Institute of Technology,Changchun 130021,China);Comprehensive analysis of the main techniques and products of building Intranet[J];Journal of Changchun Institute of Technology;2002-02
2 Zhou Dianmin,Dong Shijie,Guan Xiaohong,Cui Jian,Sun Jie (Xi'an Jiaotong University,Xi'an710049,China);E-COMMERCE APPLIED IN MODERN ELECTRICITY MARKET[J];Automation of Electric Power Systems;2001-14
3 LI Ran1, LI Wen-qian2 (1.Shijiazhuang Information Engineering Vocational College, Shijiazhuang 050035,China; 2.NO.1 High School of Xinxing,Baoding 071403,China);The Implement of E-business Security on Based of Public-Key Cryptosystem[J];Computer Knowledge and Technology;2008-23
4 Yu Zhenquan (PLA Nanjing Political Institute, Nanjing, 210003 China);A Wireless Network Security Protection System[J];;2006-09
5 YIN Hui jun (Department of Mechanical Engineering, Guangxi University of Technology, Guangxi Luzhou 545006,China);How does BO control a computer[J];JOURNAL OF GUANGXI INSTITUTE OF TECHNOLOGY;2000-02
6 CHEN Shu-hai1,JIN Hui2,JIAN Chun-rong3 (1.School of Computer,Sichuan University,Chengdu 610064;2.Huaxi Attached Hospital,Sichuan University,Chengdu 610064;3.Oil and Food Stuff Wholesale center,Sichuan Province,Chengdu 610012,China);Terminal Security of E-commerce[J];Journal of Guangxi Teachers Education University(Natural Science Edition);2008-03
7 SHEN Shi-liang (Anhui University,Hefei 230039,China);The discussion about the informational safety on the base of the OS platform[J];East China Economic Management;2001-03
8 Liu Yan Bao Zhifan Zao Yufeng (Automatic Control Dept. Southeast Uni,210096, Nanjing China);THE COMPARISON STUDY OF INTERNET PROTOCOL IPv6 AND IPv4[J];JIANGSU ELECTICAL ENGINEERING;2000-03
9 FANG Zhong, HAN Zhengzhi, CHEN Pengnian (.Department of Automation. Shanghai Jiaotong University,Shanghai 200030; Department of,Computer. China Institute of Metrology, Hangzhou 310034 );Design and Implementation of an IMAP4-based Electronic Mail Program[J];Computer Engineering;2000-11
10 WANG Qian , YANG Deli (Institute of Systems Engineering, Dalian University of Technology, Dalian 116023);Research on the Secure Techniques & Architecture of Electronic Commerce[J];Computer Engineering;2003-01
【Co-references】
Chinese Journal Full-text Database 8 Hits
1 CAI Jian (Computer Administration Supervision Division of Guizhou Provincial Public Security Bureau.Guiyang 550001,China);SECURITY TECHNOLOGY AND MANAGEMENT PROTOCOL OF THE NETWORK[J];;1999-01
2 Dan Zhiping (Computer Centre, College of Basic Course, Hubei Three Gorges University, Yichang, 443000)$;A Analysis on RSA Algorithm of Public-key Cryptosystems and Its Applied Process in Internet[J];JOURNAL OF HUBEI THREE GORGES UNIVERSITY;1999-05
3 PENG Zi lin CAO Jun hui (Liberal Arts Institute, Hunan Normal University, Changsha, Hunan 410081,China);Information Revolution and the Development of Tourism[J];JOURNAL OF SOCIAL SCIENCE OF HUNAN NORMAL UNIVERSITY;2000-02
4 Sun Baolin 1) Yang Qiu 2) (Hubei College of Fine Arts,Wuhan 430060) 1) (China University of Geosciences,Wuhan 430074) 2) Wu Changhai (Hubei College of Medical Laboratory Technology and Pharmacology,Wuhan 430064);RSA Public-key Cipher Algorithm and Its Applications in the Information Exchange[J];JOURNAL OF WUHAN TRANSPORTATION UNIVERSITY;2000-02
5 Luo Guixia;A Trial Discussion of the Development or E-business of Tourism in China[J];Tourism Science;2001-02
6 YANG Li (School of Business and Tourism Management, Yunnan University, Kunming 650091, China);A Study on the Problems and Counter-measures in the Development of China's Tourism Electronic Business[J];Tourism Tribune;2001-06
7 LI Xiao-dong, YU Xiang-xuan (Huazhong University of Science and Technology Computer College Wuhan,430000);THE CORE OF INFORMATION SECURITY ——ENCRTPTION ALGORITHMS[J];JOURNAL OF INNER MONGOLA INSTITUTE OF AGRICULTURE AND ANIMAL HUSBANDRY;2000-02
8 Lu Chen 1,Zhou Qinwu 1,Bian Zhengzhong 1,Wang Bingkang 2,Hao Wei 3 (1.Xi′an Jiaotong University, Xi′an 710049, China;2.Xijing Hospital;3.Northwest Electricity Power Professional University);Point Choosing Algorithm of Elliptic Curve Cryptography[J];JOURNAL OF XI'AN JIAOTONG UNIVERSITY;2000-06
?2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved
在线中文字幕亚洲日韩_欧美 亚洲 中文字幕 高清_亚洲 日韩 中文 综合AV <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <文本链> <文本链> <文本链> <文本链> <文本链> <文本链>