The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the key to both offline and online business, consumers' trust to retailers always influences their purchase decision. In recent years, based on the traditional business, more and more click and mortar companies spring up. But could consumers' trust transfer from offline to online channel? And how? Extant researches lack deep exploration for these questions. In this study, introducing perceived...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
The Internet of Things (IoT) is a vision for interconnecting all of the world's "things" -- from vehicles to diet scales, smart homes and electrical grids -- through a common set of networking technologies. Realizing this vision using a host-to-host communication paradigm, such as that of the Internet Protocol (IP), is challenging in the context of highly heterogeneous, constrained devices...
In this paper, we analyze both BMH algorithm and QS algorithm, focus on the improvement of QS, and present FQS algorithm which can apply to HTTP data reduction. For building this algorithm, we considered character features of pattern strings in HTTP application data, improved the collating sequence of characters in matching process, and had the bad characters jumping strategy improved for increasing...
O2O E-commerce is booming. The consumer trust is important to the development of O2O, so this paper studies the related factors of consumer trust degree of O2O in four dimensions, including customer factor, vendor factor, website platform factor and transaction environment factor. We set up a comprehensive evaluation method based on Analytical Hierarchy Process and the fuzzy analysis. Empirical analysis...
The connection between PROFIBUS network and Internet can realize remote real-time monitoring device on the fieldbus. This paper conducts detailed analysis and research advance on network security based on the interconnection methods between PROFIBUS and Internet, and proposes a PROFIBUS industrial network security model. An embedded gateway is developed especially for meeting the security requirement...
Mobile social networking is a pervasive communication platform where users with smartphones can search over the Internet and query neighboring peers to obtain the desired information. In this article, we examine the architecture, communication patterns, and especially the security and privacy of MSN. We first study three categories of mobile applications with a focus on two autonomous mobile applications,...
The security issue can't be ignored in the applications of Mobile Internet. the present mechanism is very difficult to secure the complex and sensitive data information in the applications of Mobile Internet. Using the method of support vector machine to build the multi-classifier, with the consideration of the cost of classification, different sensitivity is given to different types of sensitive...
This paper is from the view of customer to construct an evaluation target system based on customers' satisfaction; combining AHP with the gray evaluation method to establish the evaluation model, and then conduct the empirical analysis. The result shows that this method is practical and feasible, and it is truly consistent with the actual situation, which has a guiding sense for the network group...
With the popularity of Internet Consumption, students who are high-connected with internet turn into the main source of consumption online, so they have already become an important part of segment market that cannot be overlooked, coming along the online sales activities. For this reason, getting a better understanding of the characteristics of college students' online shopping behaviors, as well...
Network convergence is a trend of development of network technology. The research on next generation of convergence network puts emphasis on network architecture. Based on the summary and analysis of the research on the existing convergence network architecture; the basic clues of the research have been given. On that basis, the main problems of the existing researches are put forward and the new...
In recent years, electronic commerce is a hot issue in Chinese economic field. However, E-commerce developments in China there are still many problems, such as inadequate infrastructure and the security of electronic payment can not be assured. The problems have seriously affected the healthy development of e-commerce. Based on the current status of e-commerce development in China, this paper pointed...
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural and context-sensitive data flow analysis, mainly concerning the taint propagation and sanitization. This paper also discusses some techniques used in TASA, such as sanitization routines...
With the development of Internet technology and its applications, the boundary between virtual cyberspace and the real social environment is becoming indefinable. The cyberspace security has become a great threat and challenge which facing the governments and the whole society. Improve our technological capability of network trace-back is the basic way to solve the problem of Cyberspace Security....
In view of the technical features of CNGI and IPv6, we introduce the construction and transplant of China's first CNGI-based GIS, carry out new geographic information application technology research as well as build demonstration application of Government GIS based on “Geo-Windows”, which is a GIS software platform for E-Government application, and establish a series of technical foundation for the...
As more and more component-based systems (CBS) run in the open and dynamic Internet, it is very important to establish trust between clients and CBS. One of the key mechanisms to establish trust among different platforms in an open and dynamic environment is remote attestation, which allows a platform to vouch for its trust-related characteristics to a remote challenger. This paper proposes a novel...
Most successful cyber attacks begin with successful information gathering. Now more and more Web servers try to hide their identities by removing product tokens in the “Server” header in their responses discreetly, but that fails because of some Web fingerprinting tools. Some tools try to defeat these fingerprinting tools by changing Web servers' headers order or adding/removing some headers, but,...
Web information is diverse, complex and dynamic, while information search is heterogeneous and distributive. The traditional method of web information search is built on the basis of Client / Server model, demanding the high immediacy and timeliness of information search. When large amounts of data need to be transmitted, communication delays. This paper, from the perspectives of intelligent routing,...
In recent years, network financial services in china have developed very quickly. However, through empirical analysis, this paper argues that there are still many problems in the development of network financial services of china, such as laws and regulations problem, security problem, network infrastructure problem, etc. To solve these problems, this paper considers that we should formulate and improve...
Adopt XBRL in Net Finance consultation criteria will provide major benefits in some aspects: the convenience and reliability of finance information search, transmission and exchange cross-platform financial information data, mining and tracing data. The network and associated infrastructure and a huge database system support are essential to achieve a net financial consultation supported by XBRL....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.