Poonam Garg - Academia.edu (original) (raw)

Papers by Poonam Garg

Research paper thumbnail of An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2007

3783 Abstract—With the exponential growth of networked system and application such as eCommerce, ... more 3783 Abstract—With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis of knapsack ciphers is suggested by Spillman [7]. In order to improve the efficiency of genetic algorithm attack on knapsack cipher, the previously published attack was enhanced and re-implemented with variation of initial assumptions and results are compared with Spillman results. The experimental result of research indicates that the efficiency of genetic algorithm attack on knapsack cipher can be improved with variation of initial assumption.

Research paper thumbnail of Genetic Algorithms , Tabu Search and Simulated Annealing : A Comparison Between Three Approaches for the Cryptanalysis of Transposition Cipher

Due to increasing incidents of cyber attacks, the demand for effective internet security is incre... more Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on genetic algorithm, tabu search & simulated annealing to break a transposition cipher. We will also compare and analyze the performance of these algorithms in automated attacks on a transposition cipher. A generalized version of these algorithms can be used for attacking other cipher as well.

Research paper thumbnail of Genetic Algorithm Attack on Simplified Data Encryption Standard Algorithm

Genetic Algorithm Attack on Simplified Data Encryption Standard Algorithm

Research on computing science, 2006

With the exponential growth of networked & electronic systems, the demand of efficient and fool p... more With the exponential growth of networked & electronic systems, the demand of efficient and fool proof internet security is increasing. Security has emerged as a critical concern in wide range of electronic system. Cryptology is at the heart proving these securities. It consists of two complementary fields of study: cryptography and cryptanalysis. Cryptanalysis is one of the major challenging areas of intense research in the discipline of security. In this paper, we explored the use of genetic algorithm to break a simplified data encryption standard algorithm (SDES). To test its performance, we compared the implemented genetic algorithm attack with brute force search algorithm attack. Through extensive experiments and analysis it can be concluded that 1) genetic algorithms attack run ten times faster than brute force search algorithm attack with accuracy, and 2) genetic algorithms attack are 13% more accurate than brute force search algorithm attack, with same running time. A general...

Research paper thumbnail of Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm

Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm

The invention relates to compounds of the formula: I which are useful cardiovascular agents.

Research paper thumbnail of A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation

A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation

In this paper, comparative study of different available Secure Multiparty Computation (SMC) proto... more In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation is to make use of trusted third party to do the computation and then announce the result publicly. The major problem with this approach is that it is difficult to find a third party which is trusted by all the parties providing the inputs. This implies that the data of parties must be secured. Security is meant to achieve correctness of the result of computation and keeping the party’s input private even if some of the parties are corrupted.

Research paper thumbnail of Measuring the perceived benefits of implementing blockchain technology in the banking sector

Measuring the perceived benefits of implementing blockchain technology in the banking sector

Technological Forecasting and Social Change

Research paper thumbnail of Examining the Relationship between Social Media Analytics Practices and Business Performance in the Indian Retail and IT Industries: The Mediation Role of Customer Engagement

International Journal of Information Management

Social media analytics (SMA) is a dynamic field which has received considerable attention from bo... more Social media analytics (SMA) is a dynamic field which has received considerable attention from both academics and management practitioners alike. A significant number of the scholarly research currently being conducted in SMA, however, is conceptual. Industry experts know that SMA creates new opportunities for organisations who want to more strongly engage with their customers and improve business performance. However, the relationship between social media analytic practices (SMAP), customer engagement (CE), and business performance (BP) has not yet been sufficiently investigated from an empirical perspective. In order to gain a better understanding of the relationship between SMAP and BP and the mediation role of CE in that process, a largescale survey was conducted among senior and mid-level managers as well as consultants in the Retail and information technology (IT) industries in India. Specifically, a structured closed-ended questionnaire was administered to managers and management consultants country-wide and gathered usable responses from 281 respondents holding positions such as: Digital Marketing Executive/Digital Marketing Specialist, Management Consultant, Analytics Manager, Customer Relationship Manager, Marketing Director, Engagement Manager, etc. who were in charge of digital marketing strategies in the respondent retail and IT organisations. The questionnaire addressed issues related to the way in which SMAP contribute to an enhanced business performance through the mediation role of customer engagement. Structural Equation Modelling was employed to analyse the received empirical data. On the basis of the findings our research concludes that there is a significant positive relationship between SMAP and BP mediated by CE in the Indian retail and IT industries.

Research paper thumbnail of Face Recognition across Pose using ELM Framework

European Journal of Electrical Engineering and Computer Science

This paper proposes the use of Extreme Learning Machine regression and classification framework t... more This paper proposes the use of Extreme Learning Machine regression and classification framework to recognize face across pose. ELM regression framework is used to generate virtual frontal view from its corresponding side view. Kernel version of ELM is used for the non-linear mapping estimation between frontal and its corresponding non frontal view. Non Linear estimation using proposed KELM is found to be satisfactory even in the case of reduced image coefficients. In addition to regression framework, this paper also explored few popular face features like LBP, HOG, appearance and entropy features with ELM classification framework. Combination of appearance and entropy feature set is found to give best classification accuracy among the considered feature set. Proposed experiments are conducted on subset of FERET database with images up to 45° pose variation.

Research paper thumbnail of Applying structural equation model to study the critical risks in ERP implementation in Indian retail

Applying structural equation model to study the critical risks in ERP implementation in Indian retail

Benchmarking: An International Journal, 2017

Purpose In order to reduce the high failure rate of enterprise resource planning system (ERP) pro... more Purpose In order to reduce the high failure rate of enterprise resource planning system (ERP) projects in Indian retail, project managers need to analyze and understand the impact of risk factor on ERP implementation. The purpose of this paper is to identify the key risk factors solely or primarily for the Indian retail sector. Furthermore, this study also analyzes the impact of risk factors in ERP implementation using the structural equation model (SEM) approach. “User risk,” “project management risk,” “technological risk,” “team risk,” “organizational risk,” and “project performance risk” are the examined factors. Design/methodology/approach A theoretical model is created that explains the risk factors which may impact the success of ERP implementation. Hypotheses were also developed to evaluate the interrelationship between risk factors and success of ERP implementation. Empirical data are collected through survey questionnaire from practitioners such as project sponsors, project...

Research paper thumbnail of Genetic Algorithm Tabu Search Attack on The Mono-Aiphanetic Substitution Cipher

Genetic Algorithm Tabu Search Attack on The Mono-Aiphanetic Substitution Cipher

Paradigm, 2005

With the exponential growth of networked system and application such as Commerce, the demand for ... more With the exponential growth of networked system and application such as Commerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher. We will also compare and analyze the performance of these algorithms in automated attacks on a Mono-Alphabetic Substitution Cipher. The use of Tabu Search is a largely unexplored area in the field of Cryptanalysis. A generalized version of these algorithms can be used for attacking other cipher as well.

Research paper thumbnail of An Improved Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

An Improved Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

Abstract—With the exponential growth of networked system and application such as eCommerce, the d... more Abstract—With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of ...

Research paper thumbnail of Cryptanalysis of SDES via evolutionary computation techniques

Corr, Jun 28, 2009

The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatori... more The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First we want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem. For achieving this goal we test several evolutionary computation techniques like memetic algorithm, genetic algorithm and simulated annealing for the cryptanalysis of simplified data encryption standard problem (SDES). And second was a comparison between memetic algorithm, genetic algorithm and simulated annealing were made in order to investigate the performance for the cryptanalysis on SDES. The methods were tested and extensive computational results show that memetic algorithm performs better than genetic algorithms and simulated annealing for such type of NP-Hard combinatorial problem. This paper represents our first effort toward efficient memetic algorithm for the cryptanalysis of SDES

Research paper thumbnail of Critical Failure Factors for Enterprise Resource Planning Implementations in Indian Retail Organizations: An Exploratory Study

Enterprise resource planning (ERP) systems are increasingly being adopted by many Retail organiza... more Enterprise resource planning (ERP) systems are increasingly being adopted by many Retail organizations in India. The implementation of ERP systems in organizations is an enormously complex undertaking and costly affair. So far, ERP implementations have yielded more failures than successes. Around 75% of the ERP projects are classified as failures. This paper explores and validates the existing literature empirically to find out the critical failure factors that lead to the failure of ERP in context to Indian retail organizations. If Retail organizations can focus and improve on their management of these failure factors, they can increase the rate of success in the implementation of the ERP system.

Research paper thumbnail of Factors affecting the ERP implementation in Indian retail sector

Factors affecting the ERP implementation in Indian retail sector

Benchmarking: An International Journal, 2015

Purpose – The purpose of this paper is to make an effort in identifying and exploring the factors... more Purpose – The purpose of this paper is to make an effort in identifying and exploring the factors which may affect the success of ERP implementation in Indian retail sector. This paper also analyses the between the factors and their impact on the successful implementation of ERP using the structured equation modeling (SEM) approach. “Organizational,” “Technological,” “People” and “Project Management” are the examined factors. Design/methodology/approach – A theoretical model is created that explains the factors which may affect the success of ERP implementation. Hypotheses were also developed to evaluate the interrelationship between affecting factors and success of ERP implementation. Empirical data is collected through survey questionnaire from practitioner like project sponsors, project managers, implementation consultants and team members who are involved in ERP implementation in retail sector to test the theoretical model. Findings – Using SEM, it is found that 62.7 percent of ...

Research paper thumbnail of A Comparison of Memetic & Tabu Search for the Cryptanalysis of Simplified Data Encryption Standard Algorithm

Memetic algorithm(MA) is a population based heuristic search approach for optimization problems s... more Memetic algorithm(MA) is a population based heuristic search approach for optimization problems similar to genetic algorithm. GAs, however, rely on the concept of biological evolution, but MAs, in contrast, and mimic cultural evolution. The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. In this paper, a comparison between memetic algorithm and tabu search were made in order to investigate the performance for the cryptanalysis on simplified data encryption standard problems (SDES). The methods were tested and various experimental results indicates that the proposed memetic algorithm is able to produce high quality solutions quickly and it also demonstrate that memetic algorithm performs better than the genetic algorithm for such type of NP-Hard combinatorial problem.

Research paper thumbnail of Quality Assessment Based Fingerprint Segmentation

Quality Assessment Based Fingerprint Segmentation

Advances in Intelligent Systems and Computing, 2013

Research paper thumbnail of Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol

Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol

Advances in Intelligent Systems and Computing, 2012

SMC is a problem of n parties with inputs (x1, x2…xn) , hand over their inputs to third party for... more SMC is a problem of n parties with inputs (x1, x2…xn) , hand over their inputs to third party for computation f(x1, x2…xn) and third party announces the result in the form of y. During joint computation of inputs, all the organizations involved in computation wish to preserve privacy of their inputs. So need is to define a protocol which maintains privacy, security and correctness parameters of SMC. In this paper, single third party and multi third party model are defined and compared. The probabilistic evidences for single and multi third party SMC model have been analyzed with security analysis graphs. In this paper, we have also worked on identification and reduction of malicious conduct of TTPs in multi TTP environment.

Research paper thumbnail of Secure Multiparty Computing Protocol

Interdisciplinary Perspectives on Business Convergence, Computing, and Legality, 2013

Secure Multiparty Computation (SMC) can be defined as n number of parties who do joint computatio... more Secure Multiparty Computation (SMC) can be defined as n number of parties who do joint computation on their inputs (x 1 , x2…x n) using some function F and want output in the form of y. The increase in sensitive data on a network raises concern about the security and privacy of inputs. During joint computation, each party wants to preserve the privacy of their inputs. Therefore, there is a need to define an efficient protocol that maintains privacy, security, and correctness parameters of SMC. In this chapter, an approach towards secure computation is provided and analyzed with security graphs.

Research paper thumbnail of Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

International Journal of Security, Privacy and Trust Management, 2012

We present a solution for identification and reduction of malicious conduct by Trusted Third part... more We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to maintain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.

Research paper thumbnail of Retail sales in India - the need to go beyond enterprise-wide integration

Retail sales in India - the need to go beyond enterprise-wide integration

International Journal of Electronic Marketing and Retailing, 2012

Research paper thumbnail of An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2007

3783 Abstract—With the exponential growth of networked system and application such as eCommerce, ... more 3783 Abstract—With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis of knapsack ciphers is suggested by Spillman [7]. In order to improve the efficiency of genetic algorithm attack on knapsack cipher, the previously published attack was enhanced and re-implemented with variation of initial assumptions and results are compared with Spillman results. The experimental result of research indicates that the efficiency of genetic algorithm attack on knapsack cipher can be improved with variation of initial assumption.

Research paper thumbnail of Genetic Algorithms , Tabu Search and Simulated Annealing : A Comparison Between Three Approaches for the Cryptanalysis of Transposition Cipher

Due to increasing incidents of cyber attacks, the demand for effective internet security is incre... more Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on genetic algorithm, tabu search & simulated annealing to break a transposition cipher. We will also compare and analyze the performance of these algorithms in automated attacks on a transposition cipher. A generalized version of these algorithms can be used for attacking other cipher as well.

Research paper thumbnail of Genetic Algorithm Attack on Simplified Data Encryption Standard Algorithm

Genetic Algorithm Attack on Simplified Data Encryption Standard Algorithm

Research on computing science, 2006

With the exponential growth of networked & electronic systems, the demand of efficient and fool p... more With the exponential growth of networked & electronic systems, the demand of efficient and fool proof internet security is increasing. Security has emerged as a critical concern in wide range of electronic system. Cryptology is at the heart proving these securities. It consists of two complementary fields of study: cryptography and cryptanalysis. Cryptanalysis is one of the major challenging areas of intense research in the discipline of security. In this paper, we explored the use of genetic algorithm to break a simplified data encryption standard algorithm (SDES). To test its performance, we compared the implemented genetic algorithm attack with brute force search algorithm attack. Through extensive experiments and analysis it can be concluded that 1) genetic algorithms attack run ten times faster than brute force search algorithm attack with accuracy, and 2) genetic algorithms attack are 13% more accurate than brute force search algorithm attack, with same running time. A general...

Research paper thumbnail of Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm

Memetic & Genetic Algorithms: A Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm

The invention relates to compounds of the formula: I which are useful cardiovascular agents.

Research paper thumbnail of A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation

A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation

In this paper, comparative study of different available Secure Multiparty Computation (SMC) proto... more In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation is to make use of trusted third party to do the computation and then announce the result publicly. The major problem with this approach is that it is difficult to find a third party which is trusted by all the parties providing the inputs. This implies that the data of parties must be secured. Security is meant to achieve correctness of the result of computation and keeping the party’s input private even if some of the parties are corrupted.

Research paper thumbnail of Measuring the perceived benefits of implementing blockchain technology in the banking sector

Measuring the perceived benefits of implementing blockchain technology in the banking sector

Technological Forecasting and Social Change

Research paper thumbnail of Examining the Relationship between Social Media Analytics Practices and Business Performance in the Indian Retail and IT Industries: The Mediation Role of Customer Engagement

International Journal of Information Management

Social media analytics (SMA) is a dynamic field which has received considerable attention from bo... more Social media analytics (SMA) is a dynamic field which has received considerable attention from both academics and management practitioners alike. A significant number of the scholarly research currently being conducted in SMA, however, is conceptual. Industry experts know that SMA creates new opportunities for organisations who want to more strongly engage with their customers and improve business performance. However, the relationship between social media analytic practices (SMAP), customer engagement (CE), and business performance (BP) has not yet been sufficiently investigated from an empirical perspective. In order to gain a better understanding of the relationship between SMAP and BP and the mediation role of CE in that process, a largescale survey was conducted among senior and mid-level managers as well as consultants in the Retail and information technology (IT) industries in India. Specifically, a structured closed-ended questionnaire was administered to managers and management consultants country-wide and gathered usable responses from 281 respondents holding positions such as: Digital Marketing Executive/Digital Marketing Specialist, Management Consultant, Analytics Manager, Customer Relationship Manager, Marketing Director, Engagement Manager, etc. who were in charge of digital marketing strategies in the respondent retail and IT organisations. The questionnaire addressed issues related to the way in which SMAP contribute to an enhanced business performance through the mediation role of customer engagement. Structural Equation Modelling was employed to analyse the received empirical data. On the basis of the findings our research concludes that there is a significant positive relationship between SMAP and BP mediated by CE in the Indian retail and IT industries.

Research paper thumbnail of Face Recognition across Pose using ELM Framework

European Journal of Electrical Engineering and Computer Science

This paper proposes the use of Extreme Learning Machine regression and classification framework t... more This paper proposes the use of Extreme Learning Machine regression and classification framework to recognize face across pose. ELM regression framework is used to generate virtual frontal view from its corresponding side view. Kernel version of ELM is used for the non-linear mapping estimation between frontal and its corresponding non frontal view. Non Linear estimation using proposed KELM is found to be satisfactory even in the case of reduced image coefficients. In addition to regression framework, this paper also explored few popular face features like LBP, HOG, appearance and entropy features with ELM classification framework. Combination of appearance and entropy feature set is found to give best classification accuracy among the considered feature set. Proposed experiments are conducted on subset of FERET database with images up to 45° pose variation.

Research paper thumbnail of Applying structural equation model to study the critical risks in ERP implementation in Indian retail

Applying structural equation model to study the critical risks in ERP implementation in Indian retail

Benchmarking: An International Journal, 2017

Purpose In order to reduce the high failure rate of enterprise resource planning system (ERP) pro... more Purpose In order to reduce the high failure rate of enterprise resource planning system (ERP) projects in Indian retail, project managers need to analyze and understand the impact of risk factor on ERP implementation. The purpose of this paper is to identify the key risk factors solely or primarily for the Indian retail sector. Furthermore, this study also analyzes the impact of risk factors in ERP implementation using the structural equation model (SEM) approach. “User risk,” “project management risk,” “technological risk,” “team risk,” “organizational risk,” and “project performance risk” are the examined factors. Design/methodology/approach A theoretical model is created that explains the risk factors which may impact the success of ERP implementation. Hypotheses were also developed to evaluate the interrelationship between risk factors and success of ERP implementation. Empirical data are collected through survey questionnaire from practitioners such as project sponsors, project...

Research paper thumbnail of Genetic Algorithm Tabu Search Attack on The Mono-Aiphanetic Substitution Cipher

Genetic Algorithm Tabu Search Attack on The Mono-Aiphanetic Substitution Cipher

Paradigm, 2005

With the exponential growth of networked system and application such as Commerce, the demand for ... more With the exponential growth of networked system and application such as Commerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher. We will also compare and analyze the performance of these algorithms in automated attacks on a Mono-Alphabetic Substitution Cipher. The use of Tabu Search is a largely unexplored area in the field of Cryptanalysis. A generalized version of these algorithms can be used for attacking other cipher as well.

Research paper thumbnail of An Improved Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

An Improved Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

Abstract—With the exponential growth of networked system and application such as eCommerce, the d... more Abstract—With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of ...

Research paper thumbnail of Cryptanalysis of SDES via evolutionary computation techniques

Corr, Jun 28, 2009

The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatori... more The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First we want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem. For achieving this goal we test several evolutionary computation techniques like memetic algorithm, genetic algorithm and simulated annealing for the cryptanalysis of simplified data encryption standard problem (SDES). And second was a comparison between memetic algorithm, genetic algorithm and simulated annealing were made in order to investigate the performance for the cryptanalysis on SDES. The methods were tested and extensive computational results show that memetic algorithm performs better than genetic algorithms and simulated annealing for such type of NP-Hard combinatorial problem. This paper represents our first effort toward efficient memetic algorithm for the cryptanalysis of SDES

Research paper thumbnail of Critical Failure Factors for Enterprise Resource Planning Implementations in Indian Retail Organizations: An Exploratory Study

Enterprise resource planning (ERP) systems are increasingly being adopted by many Retail organiza... more Enterprise resource planning (ERP) systems are increasingly being adopted by many Retail organizations in India. The implementation of ERP systems in organizations is an enormously complex undertaking and costly affair. So far, ERP implementations have yielded more failures than successes. Around 75% of the ERP projects are classified as failures. This paper explores and validates the existing literature empirically to find out the critical failure factors that lead to the failure of ERP in context to Indian retail organizations. If Retail organizations can focus and improve on their management of these failure factors, they can increase the rate of success in the implementation of the ERP system.

Research paper thumbnail of Factors affecting the ERP implementation in Indian retail sector

Factors affecting the ERP implementation in Indian retail sector

Benchmarking: An International Journal, 2015

Purpose – The purpose of this paper is to make an effort in identifying and exploring the factors... more Purpose – The purpose of this paper is to make an effort in identifying and exploring the factors which may affect the success of ERP implementation in Indian retail sector. This paper also analyses the between the factors and their impact on the successful implementation of ERP using the structured equation modeling (SEM) approach. “Organizational,” “Technological,” “People” and “Project Management” are the examined factors. Design/methodology/approach – A theoretical model is created that explains the factors which may affect the success of ERP implementation. Hypotheses were also developed to evaluate the interrelationship between affecting factors and success of ERP implementation. Empirical data is collected through survey questionnaire from practitioner like project sponsors, project managers, implementation consultants and team members who are involved in ERP implementation in retail sector to test the theoretical model. Findings – Using SEM, it is found that 62.7 percent of ...

Research paper thumbnail of A Comparison of Memetic & Tabu Search for the Cryptanalysis of Simplified Data Encryption Standard Algorithm

Memetic algorithm(MA) is a population based heuristic search approach for optimization problems s... more Memetic algorithm(MA) is a population based heuristic search approach for optimization problems similar to genetic algorithm. GAs, however, rely on the concept of biological evolution, but MAs, in contrast, and mimic cultural evolution. The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. In this paper, a comparison between memetic algorithm and tabu search were made in order to investigate the performance for the cryptanalysis on simplified data encryption standard problems (SDES). The methods were tested and various experimental results indicates that the proposed memetic algorithm is able to produce high quality solutions quickly and it also demonstrate that memetic algorithm performs better than the genetic algorithm for such type of NP-Hard combinatorial problem.

Research paper thumbnail of Quality Assessment Based Fingerprint Segmentation

Quality Assessment Based Fingerprint Segmentation

Advances in Intelligent Systems and Computing, 2013

Research paper thumbnail of Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol

Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol

Advances in Intelligent Systems and Computing, 2012

SMC is a problem of n parties with inputs (x1, x2…xn) , hand over their inputs to third party for... more SMC is a problem of n parties with inputs (x1, x2…xn) , hand over their inputs to third party for computation f(x1, x2…xn) and third party announces the result in the form of y. During joint computation of inputs, all the organizations involved in computation wish to preserve privacy of their inputs. So need is to define a protocol which maintains privacy, security and correctness parameters of SMC. In this paper, single third party and multi third party model are defined and compared. The probabilistic evidences for single and multi third party SMC model have been analyzed with security analysis graphs. In this paper, we have also worked on identification and reduction of malicious conduct of TTPs in multi TTP environment.

Research paper thumbnail of Secure Multiparty Computing Protocol

Interdisciplinary Perspectives on Business Convergence, Computing, and Legality, 2013

Secure Multiparty Computation (SMC) can be defined as n number of parties who do joint computatio... more Secure Multiparty Computation (SMC) can be defined as n number of parties who do joint computation on their inputs (x 1 , x2…x n) using some function F and want output in the form of y. The increase in sensitive data on a network raises concern about the security and privacy of inputs. During joint computation, each party wants to preserve the privacy of their inputs. Therefore, there is a need to define an efficient protocol that maintains privacy, security, and correctness parameters of SMC. In this chapter, an approach towards secure computation is provided and analyzed with security graphs.

Research paper thumbnail of Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

International Journal of Security, Privacy and Trust Management, 2012

We present a solution for identification and reduction of malicious conduct by Trusted Third part... more We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to maintain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.

Research paper thumbnail of Retail sales in India - the need to go beyond enterprise-wide integration

Retail sales in India - the need to go beyond enterprise-wide integration

International Journal of Electronic Marketing and Retailing, 2012