1Paul Barnes: Assurance of security in maritime supply chains: Conceptual issues of vulnerability and crisis management[J]. Journal of Intemational Management,2005, (11): 519-540.
4Joseph Sarkis, Srinivas Talluri: Evaluating and selecting e-commerce softwareand communication systems for a supply chain [J]. European Journal of Operational Research, 2004, 159 318-329.
5Mark Lawrence Schrad. Threat level green: Conceding ecology for security in eastern Europe and the former Soviet Union [J]. Global Environmental Change, 2006, (16) : 400-422.
6Repullo Rafael. Venture Capital Finance: A security DesignApproach [J]. European Finance Review, 2005, 8 (1): 75-108.
7Gupta Manish. On Linear Codes over [J]. Designs, Codes and Cryptography, 2006, 36 (3): 227-244.
8Ungricht Stefan. Extinction threat evaluation of endemic fig trees of New Caledonia: Priority assessment for taxonomy and conservation with herbarium collections [J]. Biodiversity and Conservation, 2006, 14 (1): 205-232.
二级参考文献13
1ZHOU Q,BESSANT C B.Information management in production planning for a virtual enterprise[J].International Journalof Production Research,1999,37(1) :207-218.
2SHIMIZU A,HORIOKA T,INAGAKI H.A password authentication method for contents communication on the Internet [J].IEICE Transactions Communication,1998,E81 - B (8):1666-1673.