EDI—A strategic weapon in international trade
暂无分享,去创建一个
[1] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[2] J.K. Omura. Novel applications of cryptography in digital communications , 1990, IEEE Communications Magazine.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Elaine Waples,et al. Control of electronic data interchange systems , 1989 .
[5] Reima Suomi. Inter-organizational information systems as company resources , 1988, Inf. Manag..