scholarly journals SET for E-commerce Transactions

Author(s):  
Md. Rezaul Karim Miajee

The Secure Electronic Transaction (SET) is a convention intended for ensuring Visa exchanges over the Internet. It is an industry-supported standard that was shaped by Master Card and Visa (going about as the administering body) in February 1996. To advance the SET standard all through the installments network, exhortation and help for its improvement have been given by IBM, GTE, Microsoft, Netscape, RSA, SAIC, Terisa and VeriSign. SET depends on cryptography and X.509 v3 computerized certificates to guarantee message confidentiality and security. SET is the main Internet exchange convention to give security through validation. It battles the danger of exchange data being changed in travel by keeping data safely encoded consistently and by utilizing computerized certificates to confirm the personality of those getting to installment points of interest. The specifications of and approaches to encourage secure installment card exchanges on the Internet are completely investigated in this paper.

Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


2019 ◽  
pp. 237-250
Author(s):  
Cristian González García ◽  
Daniel Meana-Llorián ◽  
Vicente García Díaz ◽  
Edward Rolando Núñez-Valdez

2019 ◽  
Vol 16 (9) ◽  
pp. 3860-3866
Author(s):  
Sonia Sharma ◽  
Dalip ◽  
Munishwar Rai

With the unstable development of the data accessible on the Internet, WWW has turned into the most capable stage to store, recover, and communicate data. The same number of individuals have taken to the Internet for data gathering, examining client conduct from web get to the logs can be useful to make versatile framework, recommender framework, and clever online business applications. We get to log records are the documents that contain data about the connection amongst clients and the sites with the utilization of the Internet. It contains many points of interest as authentication of users, Address related to IP, time of visit, accessing, data transferred, status setting of result, URL and so on. To analyze web log data for prediction of consumer behavior, various free and paid tools is available online. By studying and comparing various analyzer, a website owner can select the best tool for prediction of consumer behavior. This paper gives a neat report between celebrated log analyzer instruments in light of their highlights and execution.


Author(s):  
G. Shahriari Mehr ◽  
M. R. Delavar ◽  
C. Claramunt ◽  
B. N. Araabi ◽  
M. R. A. Dehaqani

Abstract. In recent years, the development of the Internet plays a significant role in human's daily activities. One of the most important effects of the Internet is the change in the process of shopping. The advent of online shopping leads to establish a new channel for customers to obtain information about their desired goods and demands. Although many customers collect information from online channel, they also wish to try and search for their required goods at the stores. Besides, discovering this data leads to a new source for spatial analysis to find the users’ interests. Therefore, we can consider this data as a contextual information source for spatial analysis or primary source for recommending points of interest (POIs). In this research, our aim is to discover a relation among the users' internet searches and the goods at the stores to recommend the best store to the users. Euclidean distance is used to calculate the similarity between users' searches and the available goods at the stores. The proposed method has been implemented in the city of Tehran, capital of Iran. The results show that the users’ internet search behavior plays an essential role in the recommendation system which provides stores to the users based on the similarity among the users’ internet searches and the available goods at the stores.


2022 ◽  
pp. 132-148
Author(s):  
Kiran M. B. ◽  
Martin George Wynn

The Internet of Things (IoT) is formed by a set of physical objects with embedded sensors, connected using a network so that they can collect and exchange data. Though the concept looks simple, its deployment in industry has enormous potential to bring major business benefits and radical change. This chapter examines IoT technology and how it is being used in the corporate environment. Based on a review of existing literature and case examples, the various definitions and elements of IoT are discussed, followed by an assessment of how IoT is being used and what benefits are being delivered. Some key emergent themes are then examined – security aspects, the significance of 5G networks, and the need for an IoT strategy and project implementation guidelines. The chapter concludes by outlining possible areas for future research and suggests a step-change in the mega-infrastructure connecting IoT devices is imminent.


The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. It is commonly applied in many applications, like building automation, medical healthcare systems, transportation, environment monitoring, and energy management. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. However, the privacy of data seems to be the greatest issue that needs to be solved. This paper intends to develop an improved data sanitization and restoration framework in IoT for higher-order privacy preservation. The preservation process is carried out using key that is optimally selected. For the optimal selection of key, a new Improved Dragonfly Algorithm (IDA) is introduced. Finally, the algorithmic analysis is carried out by varying parameters like enemy distraction weight e and food attraction weight f  of the proposed algorithm


2016 ◽  
Vol 2 (2) ◽  
pp. 214-225
Author(s):  
Pas Mahyu Akhirianto ◽  
Anita B. Wandanaya ◽  
Opan Mustopah

In the development of technology that is so advanced today, especially in the field of communication and information, maintaining privacy is something that absolutely must be done for each individual. Rapoport (in Soesilo, 1998) defines privacy as an ability to control the interaction, the ability to acquire options and the ability to achieve the desired interaction. Nowadays, a lot of things that can be done by using the internet, such as selling, social interacting through social media (Social Media) such as Facebook, learn, or just read the news through the portal of electronic media, and so forth. Most of the activities that can be done on the internet, requires personal data of its users, where the issue of privacy is of onsiderableconcern. As the development of information and communication technology in this case the Internet, the technology used to protect all personal data users also grown and will continue to evolve into more sophisticated. For this reason the author took the initiative to create a Endesapp application program, which aims to facilitate a person or agency who frequently exchange data in the form of files through the Internet. With so security in maintaining personal data even be increased as well as the possibility of the spread of sensitive data has been poor. In this study, the method used is to design programs shaped application file encryption and decryption web-based cryptographic techniques to the type of algorithm that is supported is 3DES ( Triple DES ) , AES - 128 ( Advanced encyption Standard) , AES - 192 and AES - 256.


Author(s):  
Larbi Esmahi ◽  
Ylber Ramadani

Web services have become a significant technology in the evolution of the Web and distributed computing. Web services represent a set of related standards that allow any two applications to communicate and exchange data via the Internet. The main components of these standards are the general architecture, the delivery protocol (SOAP), the description language (WSDL), and the discovery directory (UDDI).


With the evolution of the Internet and related technologies, there has been an evolution of new paradigm, which is the Internet of Things (IoT). IoT is the network of physical objects, such as devices, embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. In the IoT, a large number of objects are connected to one another for information sharing, irrespective of their locations (Corcoran, 2016). Even though the IoT was defined at 1999, the concept of IoT has been in development for decades. As the technology and implementation of the IoT ideas move forward, different views for the concept of the IoT have appeared (Ma, 2011). Based on different views, in this book, the IoT is defined as a kind of modern technology, implicating machine to machine communications and person to computer communications will be extended to everything from everyday household objects to sensors monitoring the movement. Currently, we can see a few key areas of focus for the Internet of Things (IoT) that will require special attention over the course of the next decade on the part of computer science, energy technology, networks, wireless communication, and system platform. There are already a number of implementation case studies emerging from companies across a range of industry sectors.


2020 ◽  
Vol 18 (5) ◽  
pp. 401-409
Author(s):  
Divya Yadav ◽  
Balwant Raj ◽  
Balwinder Raj

The Internet of Things (IoT) is an array of interrelated registering gadgets, mechanical and advanced electronics machines, articles, creatures or individuals that are given with unique identifiers and the ability to exchange data over a system without man to man or man to PC partnership. IoT created an expanded enthusiasm to research and industrial into points of view. This development is due to the availability of low-priced, low-powered diminutive elements like processors, communications and sensors that were integrated on a single chip. In this work we design the low power microcontroller for IoT application. There are various microcontrollers available in the market for IoT application, we have done the comparative study of different microcontroller and proposed a low power microcontroller architecture based on the requirement of IoT. The power analysis is carried out by calculating power consumed in the different digital circuits with ALU and without ALU.


Sign in / Sign up

Export Citation Format

Share Document