[1] CHAI Yueting,HAN Jian,LI Fangyun.Research of agile supply chain based on coordination center[J].Computer Integerated Manufacturing Systems,1998,4(4):26-29(in Chinese).[柴跃廷,韩 坚,李芳芸.基于协调中心的敏捷供应链系统的研究[J].计算机集成制造系统,1998,4(4):26-29.] [2] WEI Wei,WANG Dejie,ZHANG Ying,et al.Study and implementation of a secure World Wide Web system based on secure sockets layer[J].Journal of Computer Research and Development,1999,36(5):619-624(in Chinese).[韦 卫,王德杰,张 英,等.基于SSL的安全WWW系统的研究与实现[J].计算机研究与发展,1999,36(5):619-624.]
[3] ZHOU Q,BESSANT C B.Information management in production planning for a virtual enterprise[J].International Journal of Production Research,1999,37(1):207-218.
[4] SHIMIZU A,HORIOKA T,INAGAKI H.A password authentication method for contents communication on the Internet[J].IEICE Transactions Communication,1998,E81-B(8):1666-1673.
[5] CARLTON R D,ZHOU Yongbin,FENG Dengguo,et al.IPSec: securing VPNs[M].Beijing:Tsinghua University Press,2002(in Chinese).[CARLTON R D,周永彬,冯登国,等.IPSec :VPN 的安全实施[M].北京:清华大学出版社,2002.]
|