:::

詳目顯示

回上一頁
題名:A Secure and Efficient Receivables Finance Model in Supply Chain Finance Environment
書刊名:電子商務學報
作者:蔡建華蘇品長
作者(外文):Tsai, Chien-huaSu, Pin-chang
出版日期:2017
卷期:19:2
頁次:頁177-203
主題關鍵詞:供應鏈金融帳款融資橢圓曲線密碼體制網路安全Supply chain financeReceivables financeElliptic curve cryptographyCybersecurity
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:3
期刊論文
1.Pfohl, H. C.、Gomm, M.(2009)。Supply chain finance: optimizing financial flows in supply chains。Logistics Research,1(3/4),149-161。  new window
2.Koblitz, Neal、Menezes, Alfred、Vanstone, Scott A.(2000)。The state of elliptic curve cryptography。Designs, Codes and Cryptography,9(2/3),173-193。  new window
3.Wuttke, D. A.、Blome, C.、Henke, M.(2013)。Focusing the financial flow of supply chains: An empirical investigation of financial supply chain management。International Journal of Production Economics,145(2),773-789。  new window
4.Alese, Boniface K.、Philemon, E. D.、Falaki, Samuel O.(2012)。Comparative analysis of Public-Key encryption schemes。International Journal of Engineering and Technology,2(9),1552-1568。  new window
5.Basu, P.、Nair, S. K.(2012)。Supply chain finance enabled early pay: Unlocking trapped value in B2B logistics。International Journal of Logistics Systems and Management,12(3),334-353。  new window
6.Camerinelli, E.(2009)。Supply chain finance。Journal of Payments Strategy & Systems,3(2),114-128。  new window
7.Gomm, M. L.(2010)。Supply chain finance: Applying finance theory to supply chain management to enhance finance in supply chains。International Journal of Logistics Research and Applications,13(2),133-142。  new window
8.Ivashina, Victoria、Scharfstein, David(2010)。Bank lending during the financial crisis of 2008。Journal of Financial Economics,97(3),319-338。  new window
9.Phillip, K.(2010)。The necessity for supply chain finance。Credit Control,31(1),39-44。  new window
10.Kumar, Arun、Tyagi, S. S.、Rana, Manisha、Aggarwal, Neha、Bhadana, Pawan(2011)。A comparative study of public key cryptosystem based on ECC and RSA。International Journal on Computer Science and Engineering,3(5),1904-1909。  new window
11.Kute, V. B.、Paradhi, P. R.、Bamnote, G. R.(2009)。A software comparison of RSA & ECC。International Journal of Computer Science and Applications,2(1),61-65。  new window
12.Lauter, K.(2004)。The advantages of elliptic curve cryptography for wireless security。IEEE Wireless Communications,11(1),62-67。  new window
13.Lenstra, Arjen K.、Verheul, Eric R.(2001)。Selecting cryptographic key sizes。Journal of Cryptology,14(4),255-293。  new window
14.Liu, Z.、Cruz, J. M.(2012)。Supply chain networks with corporate financial risks and trade credits under economic uncertainty。International Journal of Production Economics,137(1),55-67。  new window
15.Menezes, Alfred J.、Vanstone, Scott A.(1993)。Elliptic curve cryptosystems and their implementation。Journal of Cryptology,6(4),209-224。  new window
16.Mailov, A.、Abbasov, H.、Isayev, R.、Safarov, A.(2015)。Study and implementation of elliptic curve encryption algorithm for azerbaijan E-ID card。International Journal of Innovative Research in Computer and Communication Engineering,3(5),3708-3713。  new window
17.Polak, P.、Sirpal, R.、Hamdan, M.(2012)。Post-Crisis emerging role of the treasurer。European Journal of Scientific Research,86(3),319-339。  new window
18.Samta, G.、Sanjeev, K.、Monisha, S.、Sanjay, S.、MK, K.(2012)。Application of elliptic curve method in cryptography: A Literature Review。International Journal of Computer Science and Information Technologies,3(3),4499-4503。  new window
19.Shaikh, R.、Deotale, D.(2015)。A survey on VANET security using ECC, RSA & MD5。International Journal of Advanced Research in Compute and Communication Engineering,4(6),167-172。  new window
20.Sinha, R.、Srivastava, H. K.、Gupta, S.(2013)。Performance based comparison study of RSA and elliptic curve cryptography。International Journal of Scientific & Engineering Research,4(5),720-725。  new window
21.Tahat, Nedal(2014)。A new signing algorithm based on elliptic curve discrete logarithms and quadratic residue problems。Italian Journal of Pure and Applied Mathematics,32(1),125-132。  new window
22.Tsai, Chien-Hua、Su, Pin-Chang(2015)。Multi-Document threshold signcryption scheme。Security and Communication Network,8(13),2244-2256。  new window
23.Udo-Akang, D.(2014)。Cyber perspectives: Internet exploitation and business survivability。International Journal of Business, Humanities and Technology,4(2),15-27。  new window
24.Koblitz, Neal(1987)。Elliptic Curve Cryptosystems。Mathematics of Computation,48(177),203-209。  new window
25.Mentzer, John T.、DeWitt, William、Keebler, James S.、Min, Soonhong、Nix, Nancy W.、Smith, Carlo D.、Zacharia, Zach G.(2001)。Defining Supply Chain Management。Journal of Business Logistics,22(2),1-25。  new window
會議論文
1.Malig, A. A.(2012)。An outsider's look at information security management in libraries, museums, and archives (LMAs)。The 5th Rizal Library International Conference on Libraries, Archives and Museums: Common Challenges, Unique Approaches。Quezon City:Ateneo de Manila University。  new window
圖書
1.Hankerson, Darrel、Menezes, Alfred、Vanstone, Scott(2004)。Guide to Elliptic Curve Cryptography。New York:Springer-Verlag。  new window
2.Adams, Carlisle、Lloyd, Steve(2002)。Understanding PKI: Concepts, Standards, and Deployment Considerations。Addison-Wesley Publishing Company。  new window
3.The National Security Agency Central Security Service(2009)。The case for elliptic curve cryptography。San Francisco, California:NSA/CSS。  new window
4.Advisen Insurance Intelligence(2013)。Managing cyber supply chain risks。New York:Adivisen。  new window
5.ASYX Early Payment Solution(2015)。Supply chain finance platform。Serpong Tangerang:ASYX。  new window
6.Bank for International Settlements(2014)。Committee on payments and market infrastructures: Cyber resilience in financial market infrastructures。Bank for International Settlements。  new window
7.Business Innovation Observatory(2014)。Innovative business models: Supply chain finance。Brussels:European Commission。  new window
8.CERT-UK(2015)。Cyber-Security risks in the supply chain。CERT-UK。  new window
9.China Systems(2015)。Supply chain finance and factoring。Moorgate, London:China Systems。  new window
10.Citigroup Inc.(2015)。Treasury and trade solutions-Supply chain finance. Long Island City。New York:Citigroup Inc.。  new window
11.HIS(2012)。Supply chain risk 2.0: Understanding supplier networks and supply connections。Morganville, NJ:HIS。  new window
12.ING(2015)。Working capital solutions: Supply chain finance。MG, Amsterdam:ING。  new window
13.Lamoureux, J. F.、Evans, T. A.(2011)。Supply chain finance: A new means to support the competitiveness and resilience of global value chains。Rochester, NY:Social Science Research Network。  new window
14.Vacca, J. R.(2004)。Public key infrastructure: Building trusted applications and web services。Boca Raton, Florida:Taylor & Francis Group。  new window
其他
1.Drab, D.(2003)。Economic espionage and trade secret theft: Defending against the pickpockets of the New Millennium,https://www.xerox.com/downloads/wpaper/x/xgs_business_insight_economic_espionage.pdf。  new window
2.Jansma, N.,Arrendondo, B.(2004)。Performance comparison of elliptic curve and RSA digital signatures,http://www.nicj.net/files/performance_comparison_of_elliptic_curve_and_rsa_digital_signatures.pdf。  new window
3.Hurtrez, N.,Salvadori, M. G.(2010)。Supply chain finance: From myth to reality,file:///C:/Users/Latitude%207275/Downloads/mop9_supply_chain_finance.pdf。  new window
4.NYSE Euronext,The Receivables Exchange(2015)。The receivables exchange,http://starvestpartners.com/receivables-exchange/。  new window
5.Beck, T.,Demirgüç-Kunt, A.,Martinez Peria, M. S.(2008)。Policy research working paper: Bank financing for SMEs around the world: Drivers, Obstacles, Business Models, and Lending Practices,https://elibrary.worldbank.org/doi/abs/10.1596/1813-9450-4785。  new window
圖書論文
1.Miller, Victor S.(1986)。Use of elliptic curves in cryptography。CRYPTO 1985: Advances in Cryptology--CRYPTO' 85 Proceedings。Springer-Verlag。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE