Learn More
E-commerce provides low transaction costs and more convenient business mode to all over world customers. We describe many asymmetric approaches which use in E-commerce transaction and other supported cryptography algorithms which are essential in working setup of E-commerce. In this paper, we propose a model of E-transaction based on PGP. It will show that(More)
Malwares are very precarious problem for Internet users. They are malicious software or programs, programmed by attackers to interrupt computer operation, gather delicate information, or gain access to client computer system. Key-logger is one of the massive threat among various malwares. It can be a hardware key-logger or software key-logger which records(More)
With the emergence of global connectivity with expansion of computer networks during the past decade, security threats in network have become a crucial issue for computer systems. Nowadays, it is very important to retain a high level security to ensure safe and trusted communication for information exchange across the network. Different soft-computing based(More)
Dependence of electronic devices (viz. Computer, Laptop, Mobile etc.) is increasing exponentially, so large amount of data and information are stored on electronic devices. These electronic devices are interconnected in local, national and international networks, use and share a high number of various software programs. Individuals, corporations, hospitals,(More)
Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud(More)
A cloud management platform allows users to run a multitenant atmosphere exploiting the resources from the virtual infrastructure. Although, clouds area unit is engineered with SaaS, PaaS and IaaS service layers. Infrastructure services area unit is the first and foremost typical non-public cloud services. For efficiency and high-performance in the cloud(More)
Nowadays we need more services and more security in hi-tech environment for accessing the data from DW because data which is stored in Data Warehouse is crucial and sensitive. These sensitive data is used by decision maker to make the strategies decision to analyze the status and development of an origination. The data of Data Warehouse can easily access by(More)