Electronic Commerce Research
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 237
-
IT convergence and securityGritzalis, Stefanos / Zhan, Justin Z. / Jeong, Kitae et al. | 2013
- 243
-
Threat modeling of a mobile device management system for secure smart workRhee, Keunwoo / Won, Dongho / Jang, Sang-Woon et al. | 2013
- 257
-
Enhanced security in internet voting protocol using blind signature and dynamic ballotsNguyen, Thi Ai Thao / Dang, Tran Khanh et al. | 2013
- 273
-
The RBAC model and implementation architecture in multi-domain environmentYang, Zan / Wang, Jian-xin / Yang, Lin et al. | 2013
- 291
-
The effects of relationship benefit on relationship quality and store loyalty from convergence environments—NPS analysis and moderating effectsJang, Jae Hun / Kim, Sam Won / Lee, Yang Sun et al. | 2013
- 317
-
The security service rating design for IT convergence servicesChang, Hangbae et al. | 2013
- 329
-
A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodologyShi, Fei / Liu, Weijie / Jin, Dongxu et al. | 2013
- 347
-
The prediction of network efficiency in the smart gridJung, Sung-Min / Kim, Tae-Kyung / Seo, Hee-Suk et al. | 2013
- 357
-
Efficient model of Korean graphemes based on a smartphone keyboardJeong, Young-Sik / Yeom, Tae-Kyu / Park, Ji Soo et al. | 2013
- 379
-
A framework for unified digital evidence management in security convergenceLim, Kyung-Soo / Lee, Changhoon et al. | 2013
- 399
-
The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSNChu, Hai-Cheng / Lo, Chi-Hsiang / Chao, Han-Chieh et al. | 2013