Showing 1 - 10 of 7,826
Persistent link: https://www.econbiz.de/10014253748
Mobile technology is new technology in financial and banking sector. This technology help us to save our time and provide facilities to get the information about our account, transaction and transfer the money from one account to another account from anywhere and anytime
Persistent link: https://www.econbiz.de/10014145567
Cloud computing is the technology that provides different types of services as a useful resource on the Internet … and response time. And for calculating elasticity, we have taken scalability, availability, security, and usability. The …
Persistent link: https://www.econbiz.de/10014091143
security authentication process when accessing remote servers. The security of internet banking application has high level but …€ (Internet for breeders) and “AgromanuaÌlâ€. Two most popular domestic portals – „seznam.cz†and “DatoveÌ schraÌnkyâ …€ (Data boxes) were also included to compare the results of agricultural portals security. The aim of this paper is to point …
Persistent link: https://www.econbiz.de/10011142397
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
Users are often considered the weakest link in the security chain because of their natural propensity for choosing … user's personal security. However, we don't fully understand the impact on the organisation as a whole when such laxity is … contained in these policies impact on the security of the systems in an organisation. Sometimes a mandated tightening of policy …
Persistent link: https://www.econbiz.de/10010671706
RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …
Persistent link: https://www.econbiz.de/10009484555
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed …. We will propose an algorithm for the optimization of authentication process. For the application “Evaluation of TIC …
Persistent link: https://www.econbiz.de/10005154571
This research report offers a comparative analysis of privacy and data protection in Germany and India. It compares the two regimes on four counts. First, it examines how the right to privacy and/or its allied rights have developed in the two countries historically. In this, it explores the...
Persistent link: https://www.econbiz.de/10012422200