Coming Special Issue
Expiring Date:
Jan. 10, 2020
Submit a Manuscript
share
Special Issues
Expand the Popularity of Your Conference
Publish conference papers as a Special Issue
Send your Special Issue proposal to:
review_specialissue@sciencepg.com
Submit Hot Topics
Submit
If you wish to order hard copies, please click here to know more information.
Security Computing

Special Issue Flyer (PDF)

Please download to know all details of the Special Issue

Lead Guest Editor:
Fang Zhao
Tongji university, Shanghai, China
Guest Editors
Jing Zhu
University of Science and Technology of China
Hefei, Anhui, China
Introduction
Recently, with the development of a third-party payment platform, the development of online trading, electronic trading could be seen everywhere in our daily life. Compared with the previous businesses where the merchants and customers have to face to face, it brings much convenience and a series of security issues. The funds may be illegal to paraphrase by malicious users, and then bring certain losses to the businessman, consumers or the third-party payment platform. Petri nets as a formal method could be used to analysis the security issues better and easily.

Aims and Scope:

  1. Petri nets
  2. Control flow
  3. Data flow
  4. Consistency
  5. Behavioral profile
  6. Data flow errors
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186