Approach to vendor authentication

نویسندگان

  • Detlef Houdeau
  • Amit Kumer Meher
چکیده

1 Background With the remarkable and ever increasing technology growth, we need various products and services from different vendors, such as: • Home appliances • Furniture • Mobile • Internet To deliver these products and provide services, representatives from concerned companies visit our place. We somehow need to ascertain if the person visiting is an authentic representative from the concerned vendor. In many countries, there are cases where an imposter visits as a company representative and indulge in theft or even murder of the persons at home. 2 Objective The main objective of the Vendor Authentication Technique is to prevent customers from being cheated by impostors visiting them as a customer support official of a certain organization. To examine the authenticity of the vendor representative the customer generally asks the vendor representative to produce an Office ID Proof and Government ID Proof. However, this procedure may not always be secure enough and the customer may 147

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An optimization technique for vendor selection with quantity discounts using Genetic Algorithm

Vendor selection decisions are complicated by the fact that various conflicting multi-objective factors must be considered in the decision making process. The problem of vendor selection becomes still more compli-cated with the inclusion of incremental discount pricing schedule. Such hard combinatorial problems when solved using meta heuristics produce near optimal solutions. This paper propose...

متن کامل

A parameter-tuned genetic algorithm for vendor managed inventory model for a case single-vendor single-retailer with multi-product and multi-constraint

This paper develops a single-vendor single-retailer supply chain for multi-product. The proposed model is based on Vendor Managed Inventory (VMI) approach and vendor uses the retailer's data for better decision making. Number of orders and available capital are the constraints of the model. In this system, shortages are backordered; therefore, the vendor’s warehouse capacity is another limitati...

متن کامل

Introducing the Time Value of Money in a Non-consignment Vendor Managed Inventory Model

Vendor managed inventory (VMI) is an integrated approach for buyer–vendor coordination, according to which the vendor (supplier or manufacturer) decides on the appropriate buyer’s (retailer’s) inventory levels. The time value of money has not traditionally been considered in evaluating VMI supply chain’s total inventory cost in any studies up to now. Therefore, in the present study a new model ...

متن کامل

Comparison and Supply Chain Optimization for Vendor-Buyer Coordination System

Here, we consider single vendor-buyer model with multi-product and multi-customer and multi-facility location-production-distribution problem. It is assumed that the players of the supply chain are coordinated by sharing information. Vendor manufactures produce different products at different plants with limited capacities and then distribute the products to the consumers according to determini...

متن کامل

Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change

The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014