Loading [MathJax]/extensions/MathZoom.js
2009 International Symposium on Information Engineering and Electronic Commerce - Conference Table of Contents | IEEE Xplore
International Symposium on Information Engineering and Electronic Commerce, IEEC

2009 International Symposium on Information Engineering and Electronic Commerce

DOI: 10.1109/ieec15699.2009

16-17 May 2009

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Information Engineering and Electronic Commerce (IEEC), 2009 International Symposium on

[Front cover]

Publication Year: 2009,Page(s):C1 - C1

[Title page i]

Publication Year: 2009,Page(s):i - i

[Title page iii]

Publication Year: 2009,Page(s):iii - iii

[Copyright notice]

Publication Year: 2009,Page(s):iv - iv

Table of contents

Publication Year: 2009,Page(s):v - xv

list-reviewer

Publication Year: 2009,Page(s):xviii - xviii
Cellular automata (CA) or linear feedback shift register (LFSR) architecture is widely used in pseudorandom generator of applied cryptography. The paper proposes a multi-dimensional and multi-rank pseudorandom generator combined the CA algorithm and LFSR architecture. In order to test the feasibility of the design, we research on feasibility and efficient of the algorithm by using three bit tests ...Show More
To supply chain network design problems considering electronic commerce (e-commerce) of scale and further demand fluctuations, a reliability evaluation method is proposed to evaluate the performance of plants under demand fluctuations. In addition, an efficient mathematical model is proposed to adaptively determine the optimal adjustment decisions regarding production reallocation among plants und...Show More
This paper quantitatively analyzes the use of the e-marketplace for selling the returned products after rework in a dual-channel supply chain. In our dual-channel model, we derive the optimal order quantities and optimal retail prices for all the parties in the supply chain and we also propose the optimal buyback price established by the manufacturer. Through comparative analysis of the single-cha...Show More
The black hole attack is one of the security attacks that occur in mobile ad hoc networks (MANETs). In this article, the routing security issues and the problem of coordinated attack by multiple black holes acting in group in MANET are addressed in detail. Two authentication mechanisms, based on the hash function, the message authentication code (MAC) and the pseudo random function (PRF), are prop...Show More
Tacit knowledge sharing discussed in this study is important in the area of business due to its sharing to impel the organizationspsila competitive advantage. In this study, the conflict between tacit knowledge sharing and its exclusivity is described by conflict analysis based on game theory. Analysis shows that the conflict can be categorized as a non-absolute opposability conflict. Furthermore,...Show More
That the computation load is big is a shortcoming of traditional BP decoding algorithm. According to this shortcoming we give an improved BP decoding algorithm. The decoding algorithm in the iterative decoding process, only need to update the possibility of a wrong bit of information without having to update the information whose reliability is very high, raises the decoding efficiency and reduces...Show More
Distributed hash tables (DHTs) provide a scalable solution for data sharing in P2P systems. To achieve fault tolerance and ensure high data availability, DHTs typically rely on data replication. However, nodes churn, lacking of global view and existence of malicious nodes in P2P environment bring new challenges to the concurrency control for replicated data. Agreement-based algorithms require all-...Show More
In the present study, the exploratory and confirmatory factor analyses were conducted to assess the SERVQUAL instrument dimensionality, reliability and validity, and apply the SERVQUAL instrument into Chinese Express Industry. We found that the adapted SERVQUAL instrument is also a valid and valuable tool to measure service quality. ldquoSecurityrdquo is an important additional dimension of servic...Show More
This paper proposes a weighted k-means clustering algorithm based on k-means (MacQueen, 1967; Anderberg, 1973) algorithm, and it can be used to cluster texts. Firstly, the weighted k-means algorithm changes the descriptive approach of text objects, and converts the categorical attributes to numeric ones to measure the dissimilarity of text objects by Euclidean distance; then, the weighted k-means ...Show More
According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly rela...Show More
In this paper, we analysis from the supply of trade credit and present a study on the use of an important non-formal financial channel - trade credits - for firms based on Chinese companies from 2000 to 2006. In particular, we compare the use of trade credit between competition industries and non-competition industries firms. To test the difference in the use of trade credit between competition in...Show More
The characteristics of uncertainty and variability in heterogeneous wireless network bring some new security challenges. This paper proposes a dynamic trust model based on entity credibility (DTMBC) to evaluate the trustworthiness of the network. The evaluation incorporates direct trust, recommended trust, credibility of the candidate network, credibility of the evaluating entity and time stamp. D...Show More
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source n...Show More
In this paper, a stream color image cryptography has been proposed based on spatiotemporal chaos system. One-way coupled map lattices (OCML) are used to generate pseudorandom sequences and then encrypt image pixels one by one. By iterating randomly chosen chaotic maps from a set of chaotic maps for certain times, the generated pseudorandom sequences obtain high initial-value sensitivity and good r...Show More
The compact attack graphs can implicitly reveal the potential threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of ...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Information Engineering and Electronic Commerce (IEEC), 2009 International Symposium on