CLCT: cross language cipher technique

L Singh, R Johari - Security in Computing and Communications: Third …, 2015 - Springer
Abstract Information Security has become an important issue in data communication. In
modern world, internet and network applications are growing fast. So the importance and the …

EAST: exploitation of attacks and system threats in network

S Ahuja, R Johari, C Khokhar - Information Systems Design and Intelligent …, 2015 - Springer
In modern era, computer network is an emerging field. With the invention of powerful
computer network concepts today we are able to share information with each other. We build …

[PDF][PDF] Enhancing the security of credit card transaction based on visual DSC

KJ Wei, JS Lee, SJ Chen - KSII Transactions on Internet and …, 2015 - koreascience.kr
People have transferred their business model from traditional commerce to e-commerce in
recent decades. Both shopping and payment can be completed through the Internet and …

PJCT: Penetration testing based JAVA code testing tool

S Jain, R Johari, A Kaur - International Conference on …, 2015 - ieeexplore.ieee.org
Security is the key concern for every system, network or application. Penetration Testing in
Software engineering and System Security in Computer Networks are key areas in secure …