scispace - formally typeset
Book ChapterDOI

A Secure e-Shopping Using Voice Ordering

TLDR
This paper proposes a secure method of e-shopping using Pocket PCs through voice ordering through voice order, which is likely to be popular among new and existing users of the Internet.
Abstract
Internet connectivity can offer enormous advantages, how- ever security needs to be a major consideration when planning an In- ternet connection. There are significant security risks associated with the Internet that often are not obvious to new (and existing) users. In particular, intruder activities as well as vulnerabilities that could assist intruder activity are widespread. Intruder activity is difficult to predict and at times can be difficult to discover and correct. Many organizations already have lost productive time and money in dealing with intruder activity; some organizations have had their reputations suffer as a result of intruder activity at their sites being publicized. This paper proposes a secure method of e-shopping using Pocket PCs through voice ordering.

read more

Content maybe subject to copyright    Report

Citations
More filters
Patent

Systems and methods for automatic subscription-based ordering of product components

TL;DR: In this paper, the authors present a system for automatic subscription-based ordering of product components during display of media content, the system receives a voice input and determines that the voice input indicates interest in a product.

An Alternative of Secured Online Shopping System via Point-Based Contactless Smart Card

TL;DR: This exploratory study focuses on the analysis, design, development and testing of an online shopping system by using contactless smart card as security mechanism and point values for making purchase to provide alternative ways for secured online shopping without worrying about real cash being transacted in real time.
References
More filters
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

Cryiptography and Network Security : Principles and Practices, 3rd ed

TL;DR: In this article, the authors present a survey of the most popular methods for teaching creativity in the field of cryptography and apply them in the context of public-key cryptography and RSA.
Book

A concrete introduction to higher algebra

TL;DR: In this paper, the authors present an introduction to higher algebra for students with a background of a year of calculus, aiming to give these students enough experience in the algebraic theory of the integers and polynomials to appreciate the basic concepts of abstract algebra.
Proceedings ArticleDOI

Using speech recognition in a personal communications system

TL;DR: An overview of speech recognition systems and design strategies for their use in portable communications are given and types of speech recognizers are discussed.
Book

Visual Basic .NET Programming

Harold Davis
TL;DR: The introduction of Visual Basic .NET: Object--Oriented Programming in VB .NET, with a focus on projects, Forms, and Buttons, and the importance of knowing how to use the Object Browser.
Related Papers (5)
Trending Questions (1)
How can I improve my internet connection on my laptop?

Internet connectivity can offer enormous advantages, how- ever security needs to be a major consideration when planning an In- ternet connection.