The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Thr...The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Through the analysis, we hope to provide the foundation for further study.展开更多
Internal control is a hot topic at present academics and for practitioners to explore. Especially under the background of China' s rapid integration into the global economy, the rapid establishment and improvement of...Internal control is a hot topic at present academics and for practitioners to explore. Especially under the background of China' s rapid integration into the global economy, the rapid establishment and improvement of the context of the modem enterprise system, the issue is of utmost importance. The internal accounting control system is the core part of internal control, which determines the extent of establishing the entire sound internal control system, With the progress of the time, the rapid development and wide application of Internet technology has changed the survival environment and management philosophy for business. The development of network technology achieves the online office, mobile office and decentralized offices, etc. Accounting entity is no longer subject to space limitations of traditional methods, thus a large number of accounting information is transmitted tbaough the network communication lines, so that accounting activities can be extended to every node in the world, which achieves the purpose of remote processing. Under the network environment, sources of information are of diversity and multi-channel. A large number of accounting information transmitted from the network communication lines is likely to be illegally intercepted, stolen and tampered by molecules or people with ulterior motives.展开更多
This paper introduces the conception of e-manufacturing and puts forward a reference architecture of e-manufacturing.Some features of e-manufacturing and three types of information sharing are discussed.An application...This paper introduces the conception of e-manufacturing and puts forward a reference architecture of e-manufacturing.Some features of e-manufacturing and three types of information sharing are discussed.An application for monitoring equipment with e-mail is given.展开更多
A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to gen...A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to generate any photon or do any local unitary operation, an agent can obtain a shadow of the secret key by simply performing a measurement of single photon. Furthermore, the security of the protocol is analyzed. It shows that no agent can obtain the manager's secret without the help of the other agents, and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels.展开更多
文摘The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Through the analysis, we hope to provide the foundation for further study.
文摘Internal control is a hot topic at present academics and for practitioners to explore. Especially under the background of China' s rapid integration into the global economy, the rapid establishment and improvement of the context of the modem enterprise system, the issue is of utmost importance. The internal accounting control system is the core part of internal control, which determines the extent of establishing the entire sound internal control system, With the progress of the time, the rapid development and wide application of Internet technology has changed the survival environment and management philosophy for business. The development of network technology achieves the online office, mobile office and decentralized offices, etc. Accounting entity is no longer subject to space limitations of traditional methods, thus a large number of accounting information is transmitted tbaough the network communication lines, so that accounting activities can be extended to every node in the world, which achieves the purpose of remote processing. Under the network environment, sources of information are of diversity and multi-channel. A large number of accounting information transmitted from the network communication lines is likely to be illegally intercepted, stolen and tampered by molecules or people with ulterior motives.
基金Foundation item: Project supported by the national Natural Science Foundation, China (Grant No. 59990470)
文摘This paper introduces the conception of e-manufacturing and puts forward a reference architecture of e-manufacturing.Some features of e-manufacturing and three types of information sharing are discussed.An application for monitoring equipment with e-mail is given.
基金supported by the National Science Council of the Republic of China,Taiwan,China (Grant No. NSC 98-2221-E-006-097-MY3)
文摘A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to generate any photon or do any local unitary operation, an agent can obtain a shadow of the secret key by simply performing a measurement of single photon. Furthermore, the security of the protocol is analyzed. It shows that no agent can obtain the manager's secret without the help of the other agents, and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels.