• No results found

secure transactions

Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking

Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking

... Symbolic model checking has been used to formally verify specifications of secure transactions in a system for business-to-business applications. The fundamental principles behind symbolic model checking ...

11

Defending Shoulder Surfing Attacks in Secure Transactions Using Session Key Method

Defending Shoulder Surfing Attacks in Secure Transactions Using Session Key Method

... a secure transaction, The Multi color Technique and The Session key mechanism is ...For Secure transaction, A One Way Hash is generated to Validated PIN and is sent to Server in public channel so that an ...

10

Comparative Study of Image Matching Techniques for Secure Transactions in the Banking Sector

Comparative Study of Image Matching Techniques for Secure Transactions in the Banking Sector

... monetary transactions in ...perform transactions with each other’s ...the transactions are approved. The transactions are denied when any one of the images ...

6

Secure PIN Authentication for ATM Transactions using Wireless Devices

Secure PIN Authentication for ATM Transactions using Wireless Devices

... Abstract - Now-a-days many unauthorized access and theft takes place in ATM machines. In general, all the keypad based authentication system has several possibilities of password guessing by means of shoulder movements ...

6

DC Model of UPFC and its Use in Competitive Electricity Market for Loadability Enhancement

DC Model of UPFC and its Use in Competitive Electricity Market for Loadability Enhancement

... of transactions has become important issue to reserve the available transfer ...determine secure transactions occurring in the new environment. The secure transactions have been ...

7

Technology Enables Business Innovation

Technology Enables Business Innovation

... a secure high-quality experience on any ...process secure transactions, and make enterprise business applications available to a mobile global workforce, Akamai removes the complexities of technology ...

16

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

... our Secure Mobile and Remote Access solution, we offer solutions for Identity and Access Management, Secure Enterprise Access, Secure Transactions and Consumer Identity ...

8

Card-Not-Present Fraud Working Committee White Paper: Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud. Version 1.

Card-Not-Present Fraud Working Committee White Paper: Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud. Version 1.

... Risk scores are derived by evaluating any transaction request presented to the issuer’s access control server (ACS), based on variables such as transaction value, merchant type, location, and the device used to conduct ...

36

IJCSMC, Vol. 3, Issue. 7, July 2014, pg.602 – 606 RESEARCH ARTICLE A Novel Approach for Secure Mining of Horizontally Distributed Databases

IJCSMC, Vol. 3, Issue. 7, July 2014, pg.602 – 606 RESEARCH ARTICLE A Novel Approach for Secure Mining of Horizontally Distributed Databases

... of transactions D, the problem of mining association rules is to generate all association rules that have support and confidence greater than the user-specified minimum support called minsup and minimum confidence ...

5

ELECTRONIC CASH AND SET

ELECTRONIC CASH AND SET

... In Australia the cavalier attitude to interest rates following irresponsible lending policies in the mid-1980s, which lost hundreds of millions of dollars, resulted in banks seeking recovery of their losses with ...

14

An in-depth survey on integrity auditing and information hiding in cloud

An in-depth survey on integrity auditing and information hiding in cloud

... Ren, “Enabling efficient user revocation in identity-based cloud storage auditing for shared big data,” IEEE Transactions on Dependable and Secure Computing, 2018.[r] ...

5

NSTAC Response to the National Strategy for Secure Online Transactions Partial Draft version 0.2

NSTAC Response to the National Strategy for Secure Online Transactions Partial Draft version 0.2

... consumers where Government is not a direct participant in the transaction. This solution enables the NSSOT to develop approaches specific to online identity as it relates to transactions, while making clear that ...

11

TEE-based distributed watchtowers for fraud protection in the Lightning Network

TEE-based distributed watchtowers for fraud protection in the Lightning Network

... In this work, we presented TEE Guard, a proposal for a watchtower solution for the Lightning Network. The use of TEEs led to a concept that scales, because TEEs allow secrets to be securely outsourced to the watchtower ...

18

Advanced Crypto Standard to Secure the Deduplication of Data in Cloud

Advanced Crypto Standard to Secure the Deduplication of Data in Cloud

... This Project the goal of saving storage space for cloud storage services also is used for secure deduplication, but several process have been this same concept for deduplication. However this project flow some ...

7

Secure Electronic Transactions (SET): A Case of Secure System Project Failures

Secure Electronic Transactions (SET): A Case of Secure System Project Failures

... SET is a security protocol for an electronic payment sys-tem. It was invented by Visa and MasterCard in 1996 [12], [13]. A number of reputable IT organizations participated in SET developments (e.g., GTE, IBM, Microsoft, ...

5

Secure Cloud Transactions by Performance, Accuracy and Precision
Patil Vaibhav Nivrutti & K Suresh Kumar

Secure Cloud Transactions by Performance, Accuracy and Precision Patil Vaibhav Nivrutti & K Suresh Kumar

... •Disadvantages: This Existing Works only focus on data consistency. It does not focus on policy consis- tency. This work only concerns itself with local consis- tency of a single node, not with transactions that ...

5

Best Practices for Securing Your Enterprise:

Best Practices for Securing Your Enterprise:

... Secure messaging (think e-mail for now but later, instant messaging, voice over IP and so on) is about making sure only the intended recipients of a message can read it. The more that email is used, the more ...

10

KEYWORDS: Internet Applications, Security, Languages, Review and evaluation.

KEYWORDS: Internet Applications, Security, Languages, Review and evaluation.

... Transactions On Dependeble And Secure Computing ,2013 Scanning Tool Fault Detection Process Sql Injection Cross site scripting Hijack Session Cookie Poisoning Ifra[r] ...

5

A Generic Framework for Three-Factor Authentication

A Generic Framework for Three-Factor Authentication

... Lin, “Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics,” IEEE Transactions on Information Forensics and Security, vol. Hwang, “An eff[r] ...

41

For Peer Review Only. Malware Detection in Cloud Computing Infrastructures. Transactions on Dependable and Secure Computing

For Peer Review Only. Malware Detection in Cloud Computing Infrastructures. Transactions on Dependable and Secure Computing

... The intrinsic properties of virtualised infrastructures (such as elasticity, dynamic resource allocation, service co-hosting and migration) make clouds attractive as service platforms. Though, at the same time they ...

22

Show all 10000 documents...

Related subjects