Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

    D. Prabakaran1,*, Shyamala Ramachandran2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1781-1798, 2022, DOI:10.32604/cmc.2022.019591 - 07 September 2021

    Abstract The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019,… More >

  • Open Access

    ARTICLE

    Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus

    Tehreem Aslam1, Ayesha Maqbool1, Maham Akhtar1, Alina Mirza2,*, Muhammad Anees Khan3, Wazir Zada Khan4, Shadab Alam5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1089-1109, 2022, DOI:10.32604/cmc.2022.019416 - 07 September 2021

    Abstract Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the database vulnerable. This paper investigates database and Blockchain integration, where the Blockchain network works in synchronization with the database system, and offers a mechanism to validate the transactions and ensure data integrity. Limited research exists on Blockchain-based solutions for the single point of failure More >

  • Open Access

    ARTICLE

    An E-Business Event Stream Mechanism for Improving User Tracing Processes

    Ayman Mohamed Mostafa1,2,*, Saleh N. Almuayqil1, Wael Said2,3

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 767-784, 2021, DOI:10.32604/cmc.2021.018236 - 04 June 2021

    Abstract With the rapid development in business transactions, especially in recent years, it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way. Online business transactions have increased, especially when the user or customer cannot obtain the required service. For example, with the spread of the epidemic Coronavirus (COVID-19) throughout the world, there is a dire need to rely more on online business processes. In order to improve the efficiency and performance of E-business structure, a web server log must be well utilized to have the… More >

  • Open Access

    ARTICLE

    A Storage Optimization Scheme for Blockchain Transaction Databases

    Jingyu Zhang1,2, Siqi Zhong1, Jin Wang1,3, Xiaofeng Yu4,*, Osama Alfarraj5

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 521-535, 2021, DOI:10.32604/csse.2021.014530 - 18 January 2021

    Abstract As the typical peer-to-peer distributed networks, blockchain systems require each node to copy a complete transaction database, so as to ensure new transactions can by verified independently. In a blockchain system (e.g., bitcoin system), the node does not rely on any central organization, and every node keeps an entire copy of the transaction database. However, this feature determines that the size of blockchain transaction database is growing rapidly. Therefore, with the continuous system operations, the node memory also needs to be expanded to support the system running. Especially in the big data era, the increasing More >

  • Open Access

    ARTICLE

    Green Energy Development System under the Background of Environmental Sustainability

    Qin Liu*, Ruliang Zhang

    Energy Engineering, Vol.118, No.1, pp. 173-187, 2021, DOI:10.32604/EE.2020.012788 - 17 November 2020

    Abstract With the continuous advancement of economic globalization, energy demand is expanding and energy consumption is excessive, which leads to energy shortage. Unreasonable energy use also brings great challenges to the environment and affects the balance of the ecosystem seriously. The rise of the third industrial revolution has injected new vitality into energy system. The construction of energy Internet system, which integrates Internet technology and energy technology, has become a new energy system of sustainable development. It has put forward the reform scheme for the mismatch of energy demand points and environmental pollution. The deepening of… More >

  • Open Access

    ARTICLE

    Pricing Method for Big Data Knowledge Based on a Two-Part Tariff Pricing Scheme

    Chuanrong Wu1,*, Huayi Yin1, Xiaoming Yang2, Zhi Lu3, Mark E. McMurtrey4

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1173-1184, 2020, DOI:10.32604/iasc.2020.014961

    Abstract Nowadays big data knowledge is being bought and sold online for market research, new product development, or other business decisions, especially when customer demands and consumer preferences knowledge for new product development are needed. Previous studies have introduced two commonly used pricing schemes for big data knowledge transactions (e.g., cloud services): Subscription pricing and pay-per-use pricing from a big data knowledge provider’s standpoint. However, few studies to date have investigated a two-part tariff pricing scheme for big data knowledge transactions, albeit this pricing scheme may increasingly attract the big data knowledge providers in this hyper-competitive… More >

  • Open Access

    ARTICLE

    Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent

    Weijin Jiang1, 2, 3, Wei Liu2, *, Haolong Xia1, Yuhui Xu2, Dongbo Cao1, Guo Liang4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2543-2555, 2020, DOI:10.32604/cmc.2020.011454 - 16 September 2020

    Abstract In networked mobile commerce network transactions, trust is the prerequisite and key to a smooth transaction. The measurement of trust between entities involves factors such as transaction amount, transaction time, personal income of consumer entities and their risk attitude towards trust, etc., so it is difficult to accurately calculate quantitatively. In order to find out the essential characteristics of this trust relationship, based on the research background of mobile commerce in the mobile network environment, a dynamic trust mechanism is proposed through the research of trust in the mobile network environment, trust influencing factors and… More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505 - 16 September 2020

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance.… More >

  • Open Access

    ARTICLE

    The Impact of Privacy Seal on Users’ Perception in Network Transactions

    Jing Chen,Yuchen Luo2,†, Ruiqi Du3,‡

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 199-206, 2020, DOI:10.32604/csse.2020.35.199

    Abstract In the age of big data, the issue of online privacy has attracted much attention from all sectors. The introduction and establishment of an evaluation system for the privacy agreement based on a third party, together with the establishment of a safer internet transaction environment, can help to establish mutual trust between users and the platform. With the research background links to the online trading platform, this article investigates how the privacy seal which is provided by the third-party evaluation organization influences and addresses trust-awareness and privacy concerns of users, as well as exposing information… More >

  • Open Access

    ARTICLE

    Research on E-Commerce Transaction Payment System Basedf on C4.5 Decision Tree Data Mining Algorithm

    Bing Xu1,∗, Darong Huang2,†, Bo Mi3,‡

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 113-121, 2020, DOI:10.32604/csse.2020.35.113

    Abstract In this paper, according to the information classification algorithm in data mining, data in the network payment system of e-commerce is mined, forming an effective evaluation of the security of the network payment system. Firstly, the method of network security risk prediction is discussed. Secondly, according to the characteristics of network payment system, the system security index system is analyzed in detail, and the specific application process of the C4.5 Classification Algorithm in security evaluation is discussed. Finally, the data mining process is designed in detail and the corresponding code established. In this paper, data More >

Displaying 31-40 on page 4 of 45. Per Page