-
1
-
-
27444440939
-
Managing the performance impact of web security
-
Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2005). Managing the performance impact of web security. Electronic Commerce Research, 5(1), 99-116.
-
(2005)
Electronic Commerce Research
, vol.5
, Issue.1
, pp. 99-116
-
-
Stubblefield, A.1
Rubin, A.D.2
Wallach, D.S.3
-
4
-
-
80052086312
-
A case study on intelligent service design in ubiquitous computing
-
Chang, H., Kwon, H., Kang, J., & Kim, Y. (2008). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30(3), 513-529.
-
(2008)
Computing and Informatics
, vol.30
, Issue.3
, pp. 513-529
-
-
Chang, H.1
Kwon, H.2
Kang, J.3
Kim, Y.4
-
5
-
-
84867460130
-
E-commerce transactions in a virtual environment: virtual transactions
-
Scarle, S., Arnab, S., Dunwell, I., Petridis, P., Protopsaltis, A., & de Freitas, S. (2012). E-commerce transactions in a virtual environment: virtual transactions. Electronic Commerce Research, 12(3), 379-407.
-
(2012)
Electronic Commerce Research
, vol.12
, Issue.3
, pp. 379-407
-
-
Scarle, S.1
Arnab, S.2
Dunwell, I.3
Petridis, P.4
Protopsaltis, A.5
de Freitas, S.6
-
6
-
-
64249086031
-
Security analysis of electronic business processes
-
Röhrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1-2), 59-81.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
7
-
-
85076889374
-
Softspeak: making VoIP play well in existing 802.11 deployments
-
Verkaik, P., Agarwal, Y., Gupta, R., & Snoeren, A. C. (2009). Softspeak: making VoIP play well in existing 802. 11 deployments. In Proceedings of the 6th USENIX symposium on networked systems design and implementation (pp. 409-422).
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
, pp. 409-422
-
-
Verkaik, P.1
Agarwal, Y.2
Gupta, R.3
Snoeren, A.C.4
-
8
-
-
34548765252
-
A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy
-
Franke Kleist, V. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4(1-2), 41-57.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 41-57
-
-
Franke Kleist, V.1
-
9
-
-
84886241132
-
-
Mazurczyk, W., & Kotulski, Z. (2008). In Covert channel for improving VoIP security, advances in information processing and protection, part II (pp. 271-280).
-
(2008)
Covert Channel for Improving VoIP Security, Advances in Information Processing and Protection, Part II
, pp. 271-280
-
-
Mazurczyk, W.1
Kotulski, Z.2
-
11
-
-
84867047436
-
-
Lecture notes in electrical engineering
-
Kim, Y., Kang, J., Na, Y., & Chang, H. (2012) In Lecture notes in electrical engineering: Vol. 164. Study on development of appraisal business performance indicator (pp. 417-423).
-
(2012)
Study on Development of Appraisal Business Performance Indicator
, vol.164
, pp. 417-423
-
-
Kim, Y.1
Kang, J.2
Na, Y.3
Chang, H.4
|