Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful...
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of...
In recent years, contactless transactions have risen rapidly. It includes NFC, MST, contactless cards, and many other payment methods. These payment methods have certain security issues, and attackers are in a regular search for...
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. One of the simple yet powerful...
User Authentication plays a crucial role in smart card based systems. Multi-application smart cards are easy to use as a single smart card supports more than one application. These cards are broadly divided into single identity...
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working and extracting the URL & Domain...
Cross-site scripting is one of the notable exceptions effecting almost every web application. Hence, this article proposed a framework to negate the impact of the XSS attack on web servers deployed in one of the major...
The global impact of social values, norms, and cultures set the growth and future dimensions of most businesses. In global business governess, the sustainability of social entrepreneurship is heavily dependent on peoples'...
IoT is a communal association of things or equipment that can interact with each other with the help of an internet connection. IoT services play an imperative responsibility in the industry of agriculture, which can feed 10...
Indian corporations' risk management practises are examined in this study. Enterprise-wide risk management (ERM) implementation can be broken down into three broad categories: enabling factors in the organisation, ERM practises...
Elderly-friendly integrated care portals are a relatively new phenomenon that could be a helpful addition to physical primary care, for example, by lowering costs and increasing access to healthcare. However, such platforms are...
The map matching method gets simpler with higher precision positioning systems, but because the positioning framework is still not sufficiently precise or too costly for marginal map matching in practice, it is still a hot...
The COVID-19 pandemic reshapes our knowledge and reconceptualises our belief in small and medium enterprises (SMEs) as more flexible and resilient than bigger organisations under difficult socioeconomic conditions. The critical...
The aim of the paper is to evaluate the impact of novel COVID-19 on the returns and volatility of Indian stock markets with special reference to equity investment strategies of Bombay Stock Exchange. For the purpose of...
The objective of this study is to explore the challenges faced by the Indian apparel supply chain in the wake of COVID-19 to identify the factors that are being affected and build a multilevel hierarchy model to prioritize the...
This paper examines the components of Intellectual Capital (IC) as mediating variables between knowledge-based Human Resource Management (HRM) practices and organizational performance. Therefore, integrating research channels in...
Improving the quality of education is a challenging activity in every educational institution. Through this research paper, a model has been proposed representing the challenges in order to manage the trade-off to maintain the...
The outbreak of the novel COVID-19 pandemic emerged as a major black swan event which has caused shock waves and severely hurt the sentiments of market participants. The pandemic has raised uncertainties and risks all over the...
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in...
Forensic accounting is the prominent instrument in the field of accounting area to tackle the rampant situation of financial fraud. Forensic accounting is a specific branch of accounting. It involves the application of special...
The purpose of this research article is to study the effect of inclusion and perceived organizational diversity on turnover intention with the mediating role of employee engagement. Data of 413 participants were evaluated for...
Within the advanced computation time, real-time application pulled in much more attention. Implementing a better high-quality real-time system requires to improve the responsiveness of the tasks set. This research work aims to...
Motivated by the fact that human visionary intelligence plays a vital role in guiding many of the agriculture practices, this article represents an effective use of machine vision technology for estimating plant morphological...
Negation is an important linguistic phenomenon that needs to be considered for identifying correct sentiments from the opinionated data available in digital form. It has the power to alter the polarity or strength of the...
The rapidly growing technology has created new form of gaming platform for youth. The online gaming industry is revolutionised with the emergence of information technology and advanced graphical engines. The purpose of this...