礼节 发表于 2025-3-23 13:06:05
conjunctive combinatorial bids that allows formulation of some fairness properties applicable when pricing is based solely on the buyer’s bids. We then give an example payment allocation algorithm that implements these properties.全国性 发表于 2025-3-23 14:48:06
http://reply.papertrans.cn/31/3001/300066/300066_12.png合群 发表于 2025-3-23 18:13:32
0302-9743 ptember 2003....The 42 revised full papers presented together with an invited paper and a position paper were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on auctions, security, agents and search, ebXML, modeling and technology, XML, design and p惹人反感 发表于 2025-3-23 23:11:58
, digital goods have in common, that transaction costs are minimal (in comparison to conventional goods) since all logistic processes may happen consistent without changing the media of the Internet. This includes costs for information, arrangements, transaction, controlling and adapting of the bargain.百科全书 发表于 2025-3-24 05:06:26
need for an internet charity donation scheme, identify the security requirements such a scheme should fulfill, and propose a scheme that uses an anonymous electronic cash technique to make donations, and that employs smart cards for donation distribution. Finally, we analyse how the proposed scheme matches the identified security requirements.GIST 发表于 2025-3-24 09:31:35
existing mobile secure mechanism, because anonymity on mobile payment transaction can be misused by attacker. Therefore, we propose tamper-proof smart card based efficient secure mobile e-coins with .敲诈 发表于 2025-3-24 13:42:55
mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed ET-RBAC by applying it to an example of M-commerce service.erythema 发表于 2025-3-24 15:14:35
Current Chinese Economic Report Seriessolve the bid evaluation problem in an automated contracting environment. This research endeavors to offer a better alternative to the solution of the bid evaluation problem by adopting the genetic local search (GLS) method.极小 发表于 2025-3-24 19:19:42
http://reply.papertrans.cn/31/3001/300066/300066_19.pngMirage 发表于 2025-3-25 01:15:12
otected from manipulation. Motivated by such needs a security architecture for reputation systems is proposed. Within the architecture several services are identified. In addition, the mechanisms and parameters to support the identified services are also determined.