Browse Items (11810 total)
Sort by:
-
Group signature based security technique for privacy identity information protection in blockchain /
Patent Number: 202121031204, Applicant: Gauri Arun Varade.
On cryptographic algorithms blockchain is a highlight point dispersed record innovation dependent. By factual techniques, information mining and sociological mining has made clients protection face significant dangers the straightforward and open
blockchain record enhanced. -
Design of new access control structure for provenance based on secret sharing
Access control is one of the important elements in providing confidentiality to the secured data. Access specifiers helps us understand degree of rights given to the users in utilizing data records in a right manner. Tampering the records by unauthorized parties is a high concern in secure communication. Tamper detection plays an important role in trouble shooting an issue associated with network/ host intrusion scenario. The advances in information technology have driven the modern world to focus on the Web for digital information. People across the globe rely on the internet for all the data from generic information to distribution of personal data over heterogeneous networks. Technology has grown so wide to an extent, where almost all of the financial transactions are taking place through online portals. On the other hand, there has been high rise in the security threats towards users confidential data. This information is however shared by the online users while performing financial transaction in e-commerce portals. In order to maintain security mechanism over the untrusted networks various authentication techniques available in this regard. All these security procedures are said to be stubborn and adequate on contextual basis, on the other hand over a period of time the intruders would find out ways to break into systems. Data theft and intrusion into the information systems would increase on a daily basis if defensive measures are not in place. In this concern a new mechanism for securing the data using majority voting concept is proposed. Majority voting for securing the provenance data is applied. Provenance data is data of origin, genesis data and often observed as sensitive data. Provenance is a record of events, timestamps, versions, transformations occurred for the data of interest. Elicitation of an entity's genesis is termed provenance. This understanding is called as data provenance for data objects and their relationships. In most of the cases provenance data is tend to be sensitive, and a small variation or regulation paves way to changes to entire lineage of the connected data. This origin needs to be protected and only approved parties should have right to use the data. Specific description or classification of an instance's historical record or data object is called data provenance. It has many implications in different disciplines in terms of its significance for the acquisition of data flow mechanisms. Personal control of data privacy is a common scenario and various solutions towards security exists. In this regard a unique model is proposed where control of data and its related allies is available with several bodies but however not one; and if access control is to be permitted for a cause based on context, all the entities holding their right keys will have to agree and share on a common platform for accessing the data. Combining these shares in a peculiar pattern allows the grant for accessing data. The method of allocating controls to multiple bodies and allowing grants based on the combination of stakes is called a mechanism for secret sharing. Share separation may be derived from the concept of visual encryption methodology We integrate concepts of secret sharing and provenance to provide an indigenous solution for parameters of information security namely confidentiality, integrity and availability. It is with the availability of exceptional wireless internet access in mobile motivated situations, users and usage data has become massive with respect to media. For example, financial related operations carried out over online platforms by users in many ways were found insecure and unauthenticated. Procedure with appropriate algorithms are available for safe data communication in various modes, however lacks to attain high accuracy and performance with regards to the basic goals of security; confidentiality, integrity, availability at a significant level. Security is the main aspect of any communications among untrusted networks in the current world. Sincere gratitude to many researchers for their tremendous contributions to effective security algorithms despite various threats that compromise the computer systems vulnerabilities. The origin of the data, i.e., by which the transaction thread was created, is the pertinent question to be answered while the financial operation is finalized. This definition of 'data antiquity ' has received good interest from researchers in different fields for many decades and is often termed as data provenance. However, security in provenance has made some progress with recent research, particularly in the field of cyber security. This study emphases on the safety characteristics of data provenance with a distinctive cryptographic approach. The combination of these principles produces unique results for safeguarding the genesis data. -
Effect of impulse buying on socioeconomic factors and retail categories /
Indian Journal of Marketing, Vol.46, Issue 9, ISSN: 0973-8703. -
Whether shoppers of tier I city are aware about multi-brand outlets? /
Asian Journal Of Management, Vol.7, Issue 3, ISSN: 0976-495X (Print), 2321-5763 (Online). -
Assessing the loyalty of shoppers of attire multi - brand outlets : A research study /
Indian Journal Of Marketing, Vol.47, Issue 9, ISSN: 9738703. -
Pester power and advertisements influence on purchase of food products in a convenience store /
Asian Journal Of Management, Vol.8, Issue 2, pp.204-214, ISSN: 2321-5763 (Online) 0976-9495X (Print). -
Exploring the attitudes of employees & strategies adopted towards managing diversity in the information technology context /
Diversity Management is a process intended to create and maintain a positive work environment where the similarities and differences of individuals are valued. Successfully managing diversity can lead to more committed, better satisfied, better performing employees. Literature review on diversity management has mostly emphasised on organization culture, its impact on diversity openness Patrick (2010), human resource management practices in German and Indian companies Paelmke (2007), institutional environments and organizational contexts to diversity-related pressures, expectations, requirements, and incentives Siegel (2006), managing employee diversity: perceived practices and organizational outcomes {Fink, Pastore & Riemer (2003)}, perception of staff and student in relation to equal opportunities / managing diversity in the university Kandola (2001), diversity dimensions in India and its unique features of diversity factors in indian context {Patrickson and OBrien (2001)} strategies for managing human resource diversity, {Dass & Parker (1993)}, -
Twin deficit hypothesis: Some recent evidence from India /
Global Business And Economics Review, Vol.18, Issue 3/4, pp.487 - 495, ISSN: 1097-4954. -
Effect of Impulse Buying on Socio-economic factors and Retail Categories
Indian Journal of Marketing, Vol. 46, Issue 9, pp. 24-34, ISSN No. 0973-8704 -
Factors Affecting the Performance of Private Label Brands in Indian Online Market: An Assessment of Reliability and Validity
Asian Journal of Management, Vol. 7, Issue 3, pp. 223-230, ISSN No. 0973-8705 -
Neuromarketing: The new science of advertising /
Universal Journal Of Management, Vol.3, Issue 12, pp.524 - 531, ISSN No: 2331-950X. -
Shock advertising and its impact on the younger generation /
Advances In Economics And Business Management, Vol.3, Issue 6, pp.653-657, ISSN: 2394-1553 (Online), 2394-1545 (Print). -
Influence of product placements in films and television on consumers brand awareness /
Archives of Business Research -
A study on consumer perception regarding private label branding in India /
European Journal Of Business And Management, Vol.7, Issue 10, pp.388-395, ISSN No: 2222-2839 (Online) 2222-1905 (Print) -
Geometry of generalized Ricci-type solitons on a class of Riemannian manifolds
In this paper, the notion of generalized Ricci-type soliton is introduced and its geometrical relevance on Riemannian CR-manifold is established. Particularly, it is shown that a Riemannian CR-manifold is Einstein when its metric is a generalized Ricci-type soliton. Next, it has been proved that a Riemannian CR-manifold is Einstein-like, when its metric is a generalized gradient Ricci-type almost soliton (or generalized Ricci-type almost soliton for which the soliton vector field is collinear to the CR-vector field). Finally, we present an example of generalized Ricci-type solitons which illustrate our results. 2022 Elsevier B.V. -
Critical point equation on almost f-cosymplectic manifolds
Purpose: Besse first conjectured that the solution of the critical point equation (CPE) must be Einstein. The CPE conjecture on some other types of Riemannian manifolds, for instance, odd-dimensional Riemannian manifolds has considered by many geometers. Hence, it deserves special attention to consider the CPE on a certain class of almost contact metric manifolds. In this direction, the authors considered CPE on almost f-cosymplectic manifolds. Design/methodology/approach: The paper opted the tensor calculus on manifolds to find the solution of the CPE. Findings: In this paper, in particular, the authors obtained that a connected f-cosymplectic manifold satisfying CPE with \lambda=\tilde{f} is Einstein. Next, the authors find that a three dimensional almost f-cosymplectic manifold satisfying the CPE is either Einstein or its scalar curvature vanishes identically if its Ricci tensor is pseudo anti?commuting. Originality/value: The paper proved that the CPE conjecture is true for almost f-cosymplectic manifolds. 2021, H. Aruna Kumara, V. Venkatesha and Devaraja Mallesha Naik. -
Certain results on trans-paraSasakian 3-manifolds
Let M be a trans-paraSasakian 3-manifold. In this paper, the necessary and sufficient condition for the Reeb vector field of a trans-paraSasakian 3-manifold to be harmonic is obtained. Also, it is proved that the Ricci operator of M is invariant along the Reeb flow if and only if M is a paracosymplectic manifold, an ?-paraSasakian manifold or a space of negative constant sectional curvature. 2022 Walter de Gruyter GmbH, Berlin/Boston. -
m-quasi-?-Einstein contact metric manifolds
The goal of this article is to introduce and study the characterstics of m-quasi-?-Einstein metric on contact Riemannian manifolds. First, we prove that if a Sasakian manifold admits a gradient m-quasi-?-Einstein metric, then M is ?-Einstein and f is constant. Next, we show that in a Sasakian manifold if g represents an m-quasi-?-Einstein metric with a conformal vector field V, then V is Killing and M is ?-Einstein. Finally, we prove that if a non-Sasakian (?, )-contact manifold admits a gradient m-quasi-?-Einstein metric, then it is N(?)-contact metric manifold or a ?-Einstein. Kumara H.A., Venkatesha V., Naik D.M., 2022. -
STATIC PERFECT FLUID SPACE-TIME ON ALMOST KENMOTSU MANIFOLDS
In this work, we intend to investigate the characteristics of static perfect fluid space-time metrics on almost Kenmotsu manifolds. At first we prove that if a Kenmotsu manifold M is the spatial factor of static perfect fluid space-time then it is ?-Einstein. Moreover, if the Reeb vector field ? leaves the scalar curvature invariant, then M is Einstein. Next we consider static perfect fluid space-time on almost Kenmotsu (?, ?)0-manifolds and give some characteristics under certain conditions. 2021 Bulgarian Academy of Sciences. All rights reserved.