Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/1217
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Panigrahy, S K | - |
dc.contributor.author | Jena, D | - |
dc.contributor.author | Jena, S K | - |
dc.date.accessioned | 2010-04-07T06:24:14Z | - |
dc.date.available | 2010-04-07T06:24:14Z | - |
dc.date.issued | 2010-03 | - |
dc.identifier.citation | Proceedings of the International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, India, March 26-27, 2010, P 233-237 | en |
dc.identifier.isbn | 978-3-642-12213-2 (Print) 978-3-642-12214-9 (Online) | - |
dc.identifier.issn | 1865-0929 (Print) 1865-0937 (Online) | - |
dc.identifier.other | DOI: 10.1007/978-3-642-12214-9_38 | - |
dc.identifier.uri | http://www.springerlink.com/content/n49t36jw27234522/ | - |
dc.identifier.uri | http://hdl.handle.net/2080/1217 | - |
dc.description | Copyright belongs to the Book Publisher- Springer | en |
dc.description.abstract | Internet connectivity can offer enormous advantages, however security needs to be a major consideration when planning an Internet connection. There are significant security risks associated with the Internet that often are not obvious to new (and existing) users. In particular, intruder activities as well as vulnerabilities that could assist intruder activity are widespread. Intruder activity is difficult to predict and at times can be difficult to discover and correct. Many organizations already have lost productive time and money in dealing with intruder activity; some organizations have had their reputations suffer as a result of intruder activity at their sites being publicized. This paper proposes a secure method of e-shopping using Pocket PCs through voice ordering. | en |
dc.format.extent | 290806 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | - |
dc.publisher | Springer Berlin Heidelberg | en |
dc.relation.ispartofseries | Communications in Computer and Information Science;Vol. 70 | - |
dc.subject | e-shopping | en |
dc.subject | security | en |
dc.subject | speech recognition | en |
dc.subject | RSA | en |
dc.subject | .Net | en |
dc.title | A Secure e-Shopping Using Voice Ordering | en |
dc.type | Book chapter | en |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Secure e-Shopping-BAIP10.pdf | 283.99 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.