征募 发表于 2025-3-21 16:28:16
书目名称Digital Enterprise and Information Systems影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0279277<br><br> <br><br>书目名称Digital Enterprise and Information Systems读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0279277<br><br> <br><br>Formidable 发表于 2025-3-21 22:06:11
Measuring Quality in Metadata Repositorieslity problem of secure e-mail systems. The public key is taken from general information (such as e-mail address) of the recipient and thus does not require access to any certificate to validate the key. To increase the system strength, the identity-based cryptography is combined with mediated crypto肌肉 发表于 2025-3-22 04:26:19
https://doi.org/10.1007/978-3-319-24592-8r, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however等待 发表于 2025-3-22 05:27:33
Xiaoqiang Tang,Zhufeng Shao,Rui Yaosequence, we perform the scrambling in DCT domain with variable control parameters. To further enforce the security, the gray values of image pixels are diffused using keystream extracted from the extended key sequence of the chaotic map and the plainimage. As a result, the algorithm resists the cho施魔法 发表于 2025-3-22 11:52:26
Technology Management: Case of Facebookmands and needs for an extreme secure connection. An ideal security protocol should always be protecting the security of connections in many aspects, and leaves no trapdoor for the attackers. Nowadays, one of the popular cryptography protocols is hybrid cryptosystem that uses symmetric and public ke内部 发表于 2025-3-22 15:29:37
Technology Assessment in the Energy Sectorof view. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied. The algorithm which has been proposed here is based on binary coding and the complementary pair rules. Therefore, DNA reference sequence is chosen and also a secret message M is hidden i内部 发表于 2025-3-22 17:25:56
http://reply.papertrans.cn/28/2793/279277/279277_7.pngadhesive 发表于 2025-3-22 21:17:16
Strategic Induction of Decision Trees widely used because of simplicity and usability. In order to discover the most suitable services among various web services and compose them, the integrated service annotation of SOAP and REST web services is necessary. In this paper, we present semantic service framework which is designed for user没有贫穷 发表于 2025-3-23 02:41:26
Tingshao Zhu,Wen Gao,Charles X. Lingveloping countries within the last two decades. Findings from such researches focused more on the barriers to e-commerce with very little on the extent of adoption. This paper utilized the findings from past studies and the explanatory case study methodology to describe the extent of e-commerce adopexostosis 发表于 2025-3-23 07:36:54
https://doi.org/10.1007/978-1-4471-0835-1t predictions. Given the significant negative consequences of low enrollments on both academia and industry, the IS community has focused its efforts on mechanisms to increase enrollments. This study investigates how such a mechanism – social support – influences students’ aspirations to pursue an I