The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Under the considerations of trading costs and efficiency, more and more investors choose the way of online stock trading which is fast, convenient, and has preferential fee. The cost of establishing a new customer is five times more than maintaining an old one. As a result, to explore the investors choose continuous usage behavior of online security trading system as reference for security industry...
With the rapid popularization and wide application of the electronic information technology, the new business model based on the Internet is more and more recognized by the society by its fast and convenient advantages. Electronic commerce development foreground is very attractive, but people in the enjoyment of the great convenience of e-commerce, but also often plagued by security problems. This...
Desktop virtualization is a practical research focus on the virtualization technology. The purpose of desktop virtualization is to make the desktop virtual, so that users can log in to get their personal desktops through the network with any devices at any time and any place. This technology has a lot of advantages such as mobile computing, security, easier management and cost reduction, to greatly...
Housing provident fund, as the main part of China urban housing security system, provides the housing security mainly by drawing and loans. This paper estimates the total difference, regional difference and area inner difference through the estimation and decomposion of theil index. The results show that there exists very big difference in housing security development of Jiangsu housing provident...
The defense industry is a national strategic industry. With the development of China market economic system and the economic globalization, organization reform of defense industry is inevitable in China. This paper firstly analyzes the characteristics of China defense industry; then puts forward three dimensions of China's defense industrial organization, including industrial competitiveness, defense...
Fair Multi-Party Certified Mail Protocol is a value service to deliver important data over internet with guaranteed receipt for each successful delivery. Therefore, the protocol needs to be Confidential, Non-repudiation and Fairness. This paper pointed out potential security concern for a current protocol, and also came out an offline third party fair multi-party certified Mail Protocol based on signcryption...
This paper empirically studies the impacts of various corporate governance mechanisms on earnings management of listed Chinese firms from 2006 to 2008. We use eight variables to quantify various corporate governance mechanisms including ownership structure and executive compensation for 3468 listed firms sample. They include the concentration of shareholding among the ten largest shareholders, whether...
Due to privacy law and motivation of business interests, privacy is concerned and has become an important issue in data mining. This paper explores the issue of privacy-preserving distributed association rule mining in vertically partitioned data among multiple parties, and proposes a collusion-resistant algorithm of distributed association rule mining based on the Shamir's secret sharing technique,...
Peer-to-peer (P2P) technology has become as a promising scalable solution to offer high-quality streaming multimedia to a large number of consumers at reasonable cost. Many existing systems have been deployed based on IPv4 network environment [1], [2]. IPv6 protocol has been seemed as a core component in Next Generation Internet (NGI) and the P2P streaming scheme which can be implemented in a IPv4...
Comparing with the common operating system, the secure operating system can provide the user with a more safe and reliable operating platform of the computer system. The testing to the security functions of the secure operating system has become the important measure to verify its security. On the basis of the standard on the evaluation of the security of the information technology made by China (GB/T18336-2001),...
This paper is focused on analyzing business processes integration of third-party logistics service providers (3PLs) in e-commerce. 3PLs are often selected to take charge of the logistics design, delivery, storage, and transportation in a supply chain with their professional and value-added services. This paper establishes a framework of 3PLs business processes, which includes strategic processes,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.