Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 8
Abstract
In this paper, we provide a detailed description of methodology for deriving and applying Electronic Commerce (EC) security countermeasures design models from the existing IT standards. Our goal is to describe a model-based approach of how to extend such a model or
A Study: Cryptology Techniques and Methodologies
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in curr...
An Efficient Buffer less Rank Based Fault Tolerance Network on Chip System
Network-on-chip (NoC) designs are based on a compromise among the most important elements viz. power dissipation, latency and the balance is usually defined at design time. In the research work we have used Efficient Ran...
Artificial Neural Network Model Based Estimation of Finite Population Total
In a finite population denoted U=1,2,3,.....,N of N identifiable units, let X be the survey variable. The survey variables are observations from a super population. It is possible to get total information about these...
Privacy-Preserved Search in mCL-PKE Based Secure Data Sharing over Public Clouds and Credential Trust Management through SMTP Communication
With the fast prominence of cloud computing architecture, public key cryptography exhibit certificate revocation problem and in the case of identity based encryption there exist a key escrow problem. Certificateless publ...
Vague Bi-ideals and Vague Quasi Ideals of a Γ-Semiring
The concepts of vague bi-ideal and vague quasi ideal of a Γ-semiring are introduced and we characterize regular Γ-semiring in terms of vague bi-ideals and vague quasi ideals.