Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/13442
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKIDWAI, FARZIL-
dc.date.accessioned2011-03-18T10:31:50Z-
dc.date.available2011-03-18T10:31:50Z-
dc.date.issued2010-08-05-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/13442-
dc.descriptionME THESISen_US
dc.description.abstractOne can see evidence of EC everywhere on the World Wide Web (WWW). Many commercial web sites have catalogues and support online transactions, but EC is much more than these. It includes everything from sourcing to settlement and all the processes that underlie trading. The Internet’s WWW has become the primary driver of contemporary EC. Although the emphasis has moved from electronic data interchange (EDI) to the Internet, the focus is still on the technology required to exchange information rather than supporting inter- and intra-organizational business processes. EC is not just about facilitating individual business transactions, it also involves the management of the relationships that lead to and arise from transactions [38]. EC is the process of conducting business electronically among various entities in order to satisfy an organizational or individual objective. A key ingredient of EC, sometimes referred to as electronic trading, is the advertisement and procurement of goods and...en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD690;104-
dc.subjectARCHITECTUREen_US
dc.subjectELLIPTICen_US
dc.subjectCRYPTOGRAPHYen_US
dc.titleA NOVEL APPROACH FOR SECURITY AUTHENTICATION ARCHITECTURE BASED ON ELLIPTIC CURVE CRYPTOGRAPHYen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Doc-Thesis.doc1.9 MBMicrosoft WordView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.