This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n18http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n22http://localhost/temp/predkladatel/
n17http://purl.org/net/nknouf/ns/bibtex#
n16http://linked.opendata.cz/resource/domain/vavai/projekt/
n10http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/ontology/domain/vavai/
n20http://linked.opendata.cz/resource/domain/vavai/zamer/
n9https://schema.org/
shttp://schema.org/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/
skoshttp://www.w3.org/2004/02/skos/core#
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n19http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F10%3APU90531%21RIV12-GA0-26230___/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n15http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F10%3APU90531%21RIV12-GA0-26230___
rdf:type
skos:Concept n14:Vysledek
dcterms:description
This paper presents a novel approach that has been used for designing secure communication in the business information systems. The approach is based on the evolutionary approach and uses principles of genetic algorithm to %22evolve%22 the communication protocols. The protocols can be than used for establishing secure communication as well as for client/server authentication and/or key distribution in information systems. This paper presents a novel approach that has been used for designing secure communication in the business information systems. The approach is based on the evolutionary approach and uses principles of genetic algorithm to %22evolve%22 the communication protocols. The protocols can be than used for establishing secure communication as well as for client/server authentication and/or key distribution in information systems.
dcterms:title
On the Design of Communication in Business Information Systems On the Design of Communication in Business Information Systems
skos:prefLabel
On the Design of Communication in Business Information Systems On the Design of Communication in Business Information Systems
skos:notation
RIV/00216305:26230/10:PU90531!RIV12-GA0-26230___
n6:aktivita
n8:Z n8:S n8:P
n6:aktivity
P(GA102/08/1429), S, Z(MSM0021630503), Z(MSM0021630528)
n6:dodaniDat
n15:2012
n6:domaciTvurceVysledku
n10:8901015
n6:druhVysledku
n13:D
n6:duvernostUdaju
n21:S
n6:entitaPredkladatele
n19:predkladatel
n6:idSjednocenehoVysledku
276843
n6:idVysledku
RIV/00216305:26230/10:PU90531
n6:jazykVysledku
n11:eng
n6:klicovaSlova
Business information system, communication, design, security protocol, evolution
n6:klicoveSlovo
n7:evolution n7:design n7:Business%20information%20system n7:communication n7:security%20protocol
n6:kontrolniKodProRIV
[88B9164068BF]
n6:mistoKonaniAkce
Manila
n6:mistoVydani
Chengdu
n6:nazevZdroje
Proceedings of 2010 International Conference on Economics, Business and Management
n6:obor
n12:IN
n6:pocetDomacichTvurcuVysledku
1
n6:pocetTvurcuVysledku
1
n6:projekt
n16:GA102%2F08%2F1429
n6:rokUplatneniVysledku
n15:2010
n6:tvurceVysledku
Očenášek, Pavel
n6:typAkce
n18:WRD
n6:zahajeniAkce
2010-12-04+01:00
n6:zamer
n20:MSM0021630503 n20:MSM0021630528
s:numberOfPages
4
n17:hasPublisher
Institute of Electrical and Electronics Engineers
n9:isbn
978-1-4244-9202-2
n22:organizacniJednotka
26230