共 50 条
- [11] Authentication and transaction security in E-business FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 175 - 197
- [12] Modelling e-business security using business processes SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
- [13] A security blueprint for e-business applications based on the three-tier architecture 2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 879 - 884
- [14] Measurement of Firm E-business Capability to Manage and Improve Its E-business Applications ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 101 - 107
- [15] The security policy of e-business based on PKI THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 655 - 659
- [17] Research on the evaluation in alliance e-business security 2010 INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING: IC4E 2010, PROCEEDINGS, 2010, : 74 - 78
- [19] AWARENESS ON DIGITAL SECURITY AND E-BUSINESS IN NIGERIA 4TH INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCES AND HUMANITIES (SOCIOINT 2017), 2017, : 1402 - 1408
- [20] E-BUSINESS APPLICATIONS IN ENGINEERING EDUCATION ICE-B 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2010, : 41 - 46