Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPanigrahy, S K-
dc.contributor.authorJena, D-
dc.contributor.authorJena, S K-
dc.identifier.citationProceedings of the International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, India, March 26-27, 2010, P 233-237en
dc.identifier.isbn978-3-642-12213-2 (Print) 978-3-642-12214-9 (Online)-
dc.identifier.issn1865-0929 (Print) 1865-0937 (Online)-
dc.identifier.otherDOI: 10.1007/978-3-642-12214-9_38-
dc.descriptionCopyright belongs to the Book Publisher- Springeren
dc.description.abstractInternet connectivity can offer enormous advantages, however security needs to be a major consideration when planning an Internet connection. There are significant security risks associated with the Internet that often are not obvious to new (and existing) users. In particular, intruder activities as well as vulnerabilities that could assist intruder activity are widespread. Intruder activity is difficult to predict and at times can be difficult to discover and correct. Many organizations already have lost productive time and money in dealing with intruder activity; some organizations have had their reputations suffer as a result of intruder activity at their sites being publicized. This paper proposes a secure method of e-shopping using Pocket PCs through voice ordering.en
dc.format.extent290806 bytes-
dc.publisherSpringer Berlin Heidelbergen
dc.relation.ispartofseriesCommunications in Computer and Information Science;Vol. 70-
dc.subjectspeech recognitionen
dc.titleA Secure e-Shopping Using Voice Orderingen
dc.typeBook chapteren
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
Secure e-Shopping-BAIP10.pdf283.99 kBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.