期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
基于博弈的电子易物网络信用体系的建立 被引量:1
1
作者 陈苏豫 李广军 《中国高新技术企业》 2008年第11期16-16,共1页
电子易物是电子商务中发展较为迅速也比较有前景的一个模式,但信用是阻碍其发展的最大瓶颈,通过运用博弈论方法探讨易物过程中失信产生的原因以及如何建立网络信用体系的问题。
关键词 博弈论 网络信用体系 易物 电子商务
在线阅读 下载PDF
网络信用管理困境及出路探究——以网络信用管理体系的搭建为切入点
2
作者 周曼 《现代营销(下)》 2023年第6期19-21,共3页
在国家发展与社会进步中,网络生态治理具有极强的规则引领和价值导向作用。因此,如何将国家、社会主流的价值观融入网络治理规则,做到法律评价与道德评价的有机结合,实现法治和德治的相辅相成,是当代网络生态文明建设的重难点。本文响... 在国家发展与社会进步中,网络生态治理具有极强的规则引领和价值导向作用。因此,如何将国家、社会主流的价值观融入网络治理规则,做到法律评价与道德评价的有机结合,实现法治和德治的相辅相成,是当代网络生态文明建设的重难点。本文响应国家加强网络生态治理的倡导,以国家战略为导向,着眼于网络生态领域,通过对各网络主流平台的实证调研,分析平台自治困境,以网络信用体系搭建为切入点,维护广大网民合法权益,共同建设美好的精神家园,促进网站平台健康发展、行稳致远。 展开更多
关键词 平台自治 网络信用管理 网络信用管理体系
在线阅读 下载PDF
论网络信用货币 被引量:1
3
作者 魏振军 《金融理论与实践》 北大核心 2001年第7期4-6,共3页
网络信用货币产生于货币的流通职能和支付职能。它仍然遵循着信用货币发展的一般规律,并保持着信用货币的一般性质——可兑换性,即兑换成价值物的能力。而信用等级越强的货币,社会兑现的可能性越大。网络信用货币的产生对于纸币、银... 网络信用货币产生于货币的流通职能和支付职能。它仍然遵循着信用货币发展的一般规律,并保持着信用货币的一般性质——可兑换性,即兑换成价值物的能力。而信用等级越强的货币,社会兑现的可能性越大。网络信用货币的产生对于纸币、银行信用和银行监管将产生深远的影响。 展开更多
关键词 信用 信用货币 网络信用货币 可兑换性
在线阅读 下载PDF
信息不对称、农村融资困境与信用网络组织的发展 被引量:4
4
作者 金正庆 李海海 《中央财经大学学报》 CSSCI 北大核心 2009年第7期21-24,共4页
中国农村金融机构不能有效地满足农户信贷需求,其根本原因是金融供给的约束下农户特征造成的信息不对称问题。在农村信贷市场固有内在矛盾和现实约束条件的背景下,信息不对称问题难以通过合作银行乃至社区银行的改革来解决。当前最为有... 中国农村金融机构不能有效地满足农户信贷需求,其根本原因是金融供给的约束下农户特征造成的信息不对称问题。在农村信贷市场固有内在矛盾和现实约束条件的背景下,信息不对称问题难以通过合作银行乃至社区银行的改革来解决。当前最为有效的方法是发展信用网络组织,降低信息不对称从而缓解农村融资困境。 展开更多
关键词 农村金融 信息不对称 信用网络组织
在线阅读 下载PDF
2022中国现代信用发展指数67.8 网络诚信成新焦点
5
作者 刘彦华 《小康》 2022年第22期40-41,共2页
纵览历年调查结果,这是“网上购物”首次进入“诚信形象不佳的十个行业”榜单前三名。与网上购物密切相关的网络信用也在本年度进入“最让人担忧的五大信用问题”排行榜前三位,超五成受访者对此表示担忧。“完善的社会信用体系是供需有... 纵览历年调查结果,这是“网上购物”首次进入“诚信形象不佳的十个行业”榜单前三名。与网上购物密切相关的网络信用也在本年度进入“最让人担忧的五大信用问题”排行榜前三位,超五成受访者对此表示担忧。“完善的社会信用体系是供需有效衔接的重要保障,是资源优化配置的坚实基础,是良好营商环境的重要组成部分,对促进国民经济循环高效畅通、构建新发展格局具有重要意义”。 展开更多
关键词 社会信用体系 营商环境 现代信用 网络信用 网上购物 有效衔接 网络诚信 资源优化配置
在线阅读 下载PDF
信用卡网络诈骗犯罪问题调查分析 被引量:1
6
作者 白梅 《湖南税务高等专科学校学报》 2016年第2期32-33,43,共3页
当代电商平台与网络经济的迅猛发展,使得信用卡凭借使用便捷、功能丰富等优势跃升为人们最亲赖的金融支付工具,重要性愈发凸显。同时,各类高科技网络诈骗犯罪日益猖獗。通过展示海南州范围内信用卡网络诈骗现状,以期对信用卡网络犯罪进... 当代电商平台与网络经济的迅猛发展,使得信用卡凭借使用便捷、功能丰富等优势跃升为人们最亲赖的金融支付工具,重要性愈发凸显。同时,各类高科技网络诈骗犯罪日益猖獗。通过展示海南州范围内信用卡网络诈骗现状,以期对信用卡网络犯罪进一步规制有所裨益。 展开更多
关键词 信用网络诈骗 法律问题
在线阅读 下载PDF
建立我国信用管理体系的实证研究 被引量:1
7
作者 孔薇巍 夏力军 《哈尔滨商业大学学报(社会科学版)》 2003年第6期59-62,共4页
信用是现代市场经济运行和发展的重要要素之一,信用的缺失和没有建立完善的信用管理体系是制约我国经济健康、持续发展的重大障碍。本文着重分析了我国信用现状和信用管理体系存在的问题,在此基础之上提出了建立我国信用管理体系的相应... 信用是现代市场经济运行和发展的重要要素之一,信用的缺失和没有建立完善的信用管理体系是制约我国经济健康、持续发展的重大障碍。本文着重分析了我国信用现状和信用管理体系存在的问题,在此基础之上提出了建立我国信用管理体系的相应对策。 展开更多
关键词 信用管理体系 政府职能 产权保护 法律 信用管理网络 信用评估标准 中介机构 信贷部门
在线阅读 下载PDF
“对症下药”防范网络信息盗窃 被引量:1
8
作者 云飞 《中国信息安全》 2010年第8期64-66,共3页
网络时代的'规模效应'促使大量的实体经济形式如办公、购物、金融交易等加速网络化,这些新兴行业在带给人们方便快捷的生活同时,也把网络信息盗窃等安全问题也以前所未有的'加速度'摆在人们面前。据有关数据显示,2009... 网络时代的'规模效应'促使大量的实体经济形式如办公、购物、金融交易等加速网络化,这些新兴行业在带给人们方便快捷的生活同时,也把网络信息盗窃等安全问题也以前所未有的'加速度'摆在人们面前。据有关数据显示,2009年中国网上交易金额每年达300亿元,而中国网络用户因信息盗窃造成的直接经济损失每年达76亿,政府、企业的大量机密文件和商业情报被盗窃带来的间接损失更难以用金钱来衡量。 展开更多
关键词 病毒木马 安全度 用户 信用体系 操作系统 安全计量 计算机系统 域名解析 网络信用 受害人 资源 信息安全管理 信息管理 防火墙技术 网络钓鱼 网站挂马 网络站点 网络接口 邮件附件 网址 信用数据 网络信息 查杀
在线阅读 下载PDF
汕头信用建设试点工作情况介绍
9
《经济研究参考》 2002年第44期40-44,共5页
在广东省委、省政府的关怀和重视下,在广东省信息产业厅、财政厅等有关部门的大力支持和具体指导下,汕头信用建设取得了阶段性成效。“汕头信用网”
关键词 汕头市 市场经济 社会信用体系 法制 信用网络
在线阅读 下载PDF
Characterizing Internet Backbone Traffic Based on Deep Packets Inpection and Deep Flows Inspection 被引量:4
10
作者 杨洁 袁仑 +3 位作者 林平 丛蓉 程钢 尼万-安瑟瑞 《China Communications》 SCIE CSCD 2012年第5期42-54,共13页
Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic ... Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic classifying efficiency in this pa- per. In particular, the study has scrutinized the net- work traffic in terms of protocol types and signatures, flow length, and port distffoution, from which mean- ingful and interesting insights on the current Intemet of China from the perspective of both the packet and flow levels are derived. We show that the classifica- tion efficiency can be greatly irrproved by using the information of preferred ports of the network applica- tions. Quantitatively, we find two traffic duration thresholds, with which 40% of TCP flows and 70% of UDP flows can be excluded from classification pro- cessing while the in^act on classification accuracy is trivial, i.e., the classification accuracy can still reach a high level by saving 85% of the resources. 展开更多
关键词 network traffic traffic characterization traffic monitoring PACKET flow
在线阅读 下载PDF
Research on E-mail Communication Network Evolution Model Based on User Information Propagation 被引量:1
11
作者 ZHANG Lejun GUO Lin XU Li 《China Communications》 SCIE CSCD 2015年第7期108-118,共11页
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ... E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication. 展开更多
关键词 E-MAIL social network analysis network evolution information propagation
在线阅读 下载PDF
Joint Optimization on Energy and Delay for Target Tracking in Internet of Things 被引量:4
12
作者 黎羴 范春晓 《China Communications》 SCIE CSCD 2011年第1期20-27,共8页
Network and communications models are built for target tracking and pursuing in the Internet of Things (IoT).According to these models,two tracking schemes which jointly optimize the pursuing energy and delay are prop... Network and communications models are built for target tracking and pursuing in the Internet of Things (IoT).According to these models,two tracking schemes which jointly optimize the pursuing energy and delay are proposed.The merits of these schemes are that they can enhance energy efficiency of both the pursuing route and communication in the network.Moreover,experimental results are provided to demonstrate the benefits of the proposed schemes which will be used as optimization schemes for the IoT tracking service. 展开更多
关键词 Internet of Things sensor network target tracking ROUTING DELAY
在线阅读 下载PDF
Traffic Labeller: Collecting Internet Traffic Samples with Accurate Application Information 被引量:2
13
作者 PENG Lizhi ZHANG Hongli +2 位作者 YANG Bo CHEN Yuehui WU Tong 《China Communications》 SCIE CSCD 2014年第1期69-78,共10页
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socke... Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socket calls and their corresponding application process information in the user mode on a Windows host.Once a sending data call has been captured,its 5-tuple {source IP,destination IP,source port,destination port and transport layer protocol},associated with its application information,is sent to an intermediate NDIS driver in the kernel mode.Then the intermediate driver writes application type information on TOS field of the IP packets which match the 5-tuple.In this way,each IP packet sent from the Windows host carries their application information.Therefore,traffic samples collected on the network have been labelled with the accurate application information and can be used for training effective traffic classification models. 展开更多
关键词 network measurement traffic cla- ssification data collection ground truth
在线阅读 下载PDF
Incorporating Network Coding into TCP Grounded on Network Utility Maximization in Multi-Radio Multi-Channel Wireless Mesh Networks 被引量:1
14
作者 Liu Hongquan Gu Yuantao 《China Communications》 SCIE CSCD 2012年第6期28-35,共8页
A new approach, named TCP-I2NC, is proposed to improve the interaction between network coding and TCP and to maximize the network utility in interference-free multi-radio multi-channel wireless mesh networks. It is gr... A new approach, named TCP-I2NC, is proposed to improve the interaction between network coding and TCP and to maximize the network utility in interference-free multi-radio multi-channel wireless mesh networks. It is grounded on a Network Utility Maxmization (NUM) formulation which can be decomposed into a rate control problem and a packet scheduling problem. The solutions to these two problems perform resource allocation among different flows. Simulations demonstrate that TCP-I2NC results in a significant throughput gain and a small delay jitter. Network resource is fairly allocated via the solution to the NUM problem and the whole system also runs stably. Moreover, TCP-I2NC is compatible with traditional TCP variants. 展开更多
关键词 network utility maximization net-work coding wireless mesh network TCP
在线阅读 下载PDF
Broadband & Digital Content-Couple Subscriber Cooperative Relaying Networks for Uplink Transmission using Hierarchical Game Approach 被引量:3
15
作者 Song Meil Teng Yinglei Niu Fang Zhang Yong Wang Li 《China Communications》 SCIE CSCD 2010年第2期16-31,共16页
Cooperation allows wireless network users to benefit from various gains such as an in- crease in the achieved rate or an improvement in the bit error rate. In the paper, we propose a distributed Hierarchical Game (HG... Cooperation allows wireless network users to benefit from various gains such as an in- crease in the achieved rate or an improvement in the bit error rate. In the paper, we propose a distributed Hierarchical Game (HG) theoretic framework over multi-user cooperative communication networks to stimulate cooperation and improve the network performance. First, we study a two- user decision making game in the OFDMA based subscriber cooperative relaying network, in which subscribers transmit their own data in the first phase, while helping to retransmit their partner's or choosing to freeride in the second phase. Instead of consulting to a global optimal solution, we decouple the cooperation resource allocation into two level subproblems: a user level Nash game for distributed cooperation decision and a Base Station (BS) level coalition game for centralized resource allocation. In the proposed HG algorithm, where mutual cooperation is preferred and total payoff is transferable, we prove it converges to a unique optimal equilibrium and resolve the subcarrier as-signment and power allocation among the couples. Besides, we discuss the existence of the publishing and rewarding coefficients in order to encourage cooperation. Then, we extend the HG to multi-user cases by coupling among subscribers according to the location information. The simulation results show that the proposed scheme with the distributed HG game achieves a well tradeoff between fairness and efficiency by improving the transmission efficiency of adverse users and outperforms those employing centralized schemes. 展开更多
关键词 cooperative relay hierachical game infrastructure relay subscriber relay Nash Equilibrium
在线阅读 下载PDF
Exploring Application Layer Protocol Relationships in SoftSwitch
16
作者 Zhu Xiaomin Liao Jianxin +1 位作者 Chen Junliang Li Tonghong 《China Communications》 SCIE CSCD 2009年第4期155-167,共13页
Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu... Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead. 展开更多
关键词 protocol relationship protocol grouping SOFTSWITCH information flow trail
在线阅读 下载PDF
Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks 被引量:1
17
作者 LI Hongning PEI Qingqi MA Lichuan 《China Communications》 SCIE CSCD 2014年第3期125-136,共12页
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha... For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks. 展开更多
关键词 HANDOFF tracking user attack attack tree
在线阅读 下载PDF
Research on Services Modeling in LTE Networks 被引量:2
18
作者 LIU Qi SHI Yameng +1 位作者 LI Fuchang FAN Bin 《China Communications》 SCIE CSCD 2016年第2期109-120,共12页
Service modeling offers fundamental guidance to the construction and operation of mobile telecommunication networks. As the domestic LTE networks have been deployed massively, the refined LTE services model needs to b... Service modeling offers fundamental guidance to the construction and operation of mobile telecommunication networks. As the domestic LTE networks have been deployed massively, the refined LTE services model needs to be established urgently. In this paper, we firstly extract characteristic parameters of services from statistical data in 3G networks, especially in time, space and user dimension. Secondly, the development trends of LTE services are analyzed. And the refined LTE service model is established. Finally, prediction results of LTE service development in China is given, which could provide effi cient support for networks' optimization and evolution. 展开更多
关键词 LTE services model refinedoperations services value
在线阅读 下载PDF
Survey on Key Technology Development and Application in Trusted Computing 被引量:7
19
作者 Juan Wang Yuan Shi +5 位作者 Guojun Peng Huanguo Zhang Bo Zhao Fei Yan Fajiang Yu Liqiang Zhang 《China Communications》 SCIE CSCD 2016年第11期70-90,共21页
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi... Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future. 展开更多
关键词 cyberspace security information security information system security CRYPTOGRAPHY trusted computing
在线阅读 下载PDF
APO-Based Parallel Algorithm of Channel Allocation for Cognitive Networks 被引量:1
20
作者 Ming Zhong Hailin Zhang Bei Ma 《China Communications》 SCIE CSCD 2016年第6期100-109,共10页
This article investigates channel allocation for cognitive networks, which is difficult to obtain the optimal allocation distribution. We first study interferences between nodes in cognitive networks and establish the... This article investigates channel allocation for cognitive networks, which is difficult to obtain the optimal allocation distribution. We first study interferences between nodes in cognitive networks and establish the channel allocation model with interference constraints. Then we focus on the use of evolutionary algorithms to solve the optimal allocation distribution. We further consider that the search time can be reduced by means of parallel computing, and then a parallel algorithm based APO is proposed. In contrast with the existing algorithms, we decompose the allocation vector into a number of sub-vectors and search for optimal allocation distribution of sub-vector in parallel. In order to speed up converged rate and improve converged value, some typical operations of evolutionary algorithms are modified by two novel operators. Finally, simulation results show that the proposed algorithm drastically outperform other optimal solutions in term of the network utilization. 展开更多
关键词 CRNs channel allocation parallel computing APO PSO
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部