Learn More
Keywords: e-Payment systems (EPS) EPS use Electronic commerce Security Trust a b s t r a c t It is commonly believed that good security improves trust, and that the perceptions of good security and trust will ultimately increase the use of electronic commerce. In fact, customers' perceptions of the security of e-payment systems have become a major factor in(More)
The supersaturatable self-microemulsifying drug delivery system (S-SMEDDS) represents a new thermodynamically stable formulation approach wherein it is designed to contain a reduced amount of surfactant and a water-soluble polymer (precipitation inhibitor or supersaturated promoter) to prevent precipitation of the drug by generating and maintaining a(More)
  • Liu Li-chao, Li Shou-zhong, Duan Zheng-hu, Wang Tao, Zhang Zhi-shan
  • 2006
Information regarding dew deposition on microbiotic crusts is scarce in Chinese desert areas. An area of restored vegetation, where microbiotic crusts with different developmental levels are distributed in the revegetated enclosures of different ages, provides an ideal opportunity to study the hydrological issues related to the development processes of(More)
Low-Cost Shortest Path Tree is a commonly-used multicast tree type, which can minimize the end-to-end delay and at the same time reduce the bandwidth requirement if possible. Based on the low-cost shortest path tree algorithm DDSP (destination-driven shortest path) and through improving on the search procedure, a Fast Low-cost Shortest Path Tree (FLSPT)(More)
LIDAR (Light Detection And Ranging) is widely used in forestry applications to obtain information about tree density, composition, change, etc. An advantage of LIDAR is its ability to get this information in a 3D structure. However, the density of LIDAR data is low, the acquisition of LIDAR data is often very expensive, and it is difficult to be utilised in(More)
The previous I-cache timing attacks on RSA which exploit the instruction path of a cipher were mostly proof-of-concept, and it is harder to put them into practice than D-cache timing attacks. We propose a new trace driven timing attack model based on spying on the whole I-cache. An improved analysis algorithm of the exponent using the characteristic of the(More)
Pavement cracking is one of the most important distress types. This paper provids an approach for achieving an automatic classification for pavement surface images. First, image enhancement is performed by mathematical morphological operator. secondly, pavement image segmentation is performed to separate the cracks from the background. Projection features(More)
The Skeleton Line is a very important function to the various automatic transactions for polygon, which is important to map generalization, grid data compression, lettering annotation, and analysis of geographical phenomenon of polygon in GIS etc. The skeleton of area object can be extracted by algorithm based on vector or grid data automatically. Using(More)
Malicious web pages are a widely-recognized threat to the security of the web. Malicious web pages launch so-called drive-by download attacks that are able to gain complete control of a user’s computer for illegitimate purpose. Even a single visit to a malicious web page enables an automatically download and installation of malicious malware(More)
Government nor any agency thereof, nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any(More)