共 50 条
- [41] XML based security for e-commerce applications [J]. EIGHTH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2001, : 10 - 17
- [42] Composition of negotiation protocols for e-commerce applications [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 418 - 423
- [43] Detecting Logic Vulnerabilities in E-Commerce Applications [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [44] Directions for web and e-commerce applications security [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 200 - 204
- [45] The genetic algorithm in e-commerce applications. [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 2, Proceedings: COMMUNICATIONS, INFORMATION AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 126 - 128
- [47] Visual authorization modeling in e-commerce applications [J]. IEEE MULTIMEDIA, 2003, 10 (01) : 44 - 54
- [50] E-commerce applications of the Hybrid Reasoning Method [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 797 - 801