Sciweavers

ISECS
2008
IEEE
14 years 6 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
ISECS
2008
IEEE
14 years 6 months ago
Assessing the Impact of Information Technology on Supply Chain Management
: Companies attempt to companies are attempting to find ways to improve their flexibility and responsiveness and in turn competitiveness by changing their operations strategy, meth...
Mehdi Fasanghari
ISECS
2008
IEEE
14 years 6 months ago
Key Technology and System Design in Mobile Supply Chain Management
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations....
Qi Yuan, Zhao Xiaokang, Zhang Qiong
ISECS
2008
IEEE
14 years 6 months ago
A Regression-based Coordination for Concurrent Negotiation
Given that resource providers and consumers may have different requirements and performance goals, concurrent negotiation is considered in this work to successfully obtain commitm...
Benyun Shi, Kwang Mong Sim
ISECS
2008
IEEE
14 years 6 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel