Samara Mubeen

Work place: J.N.N. College of Engineering/Information Science and Engineering, Shimoga, 577201, India

E-mail: samaramubeen7860@gmail.com

Website:

Research Interests: Computer Science & Information Technology, Computational Science and Engineering, Information Systems, Models of Computation

Biography

Mrs. Samara Mubeen Assistant Professor in Department of Information Science of Engineering of JNNCE College. I am research scholar, pursuing research in B2B technology, strategy involved in the B2B market, building framework model and performance analysis in B2B market using analytical tool. Published papers in reputed international Journals.

Author Articles
Double Securing from Hackers in B2B E-commerce

By Samara Mubeen Srinath N.K. Subramanya K.N.

DOI: https://doi.org/10.5815/ijitcs.2016.01.08, Pub. Date: 8 Jan. 2016

Business to Business e-commerce is adopted by more and more companies all over the world. Many companies will be involved in doing business over internet among them some will act as manufacturer and other as suppliers of the sub products. Here we are going consider two types of hackers, the hackers who are outside the organization and the hackers present within the organization. The problem is how to identifying authentic supplier and to see that after authentication the data integrity, here we consider it as the number of sub product to be manufactured that should reach the authentic supplier in the presence of hacker within the organization. There is need for designing trusted security framework. In this paper we are designing a security framework which runs double securing algorithm by using keyless cryptography algorithm for finding the authentic supplier and to see that the order of sub product to be manufactured reaches correct supplier for this caser cryptography algorithm is used. The authentication solves the problem of outside hackers and uses of caser cryptography solve the problem of hacker within the organization. The double securing algorithm is implemented on MATLAB, CPU time is calculated to known the time taken to run the security mechanism.

[...] Read more.
Other Articles