Security improvement of credit card online purchasing system
The paper aims to improve the security of the credit card online purchasing with taking into account the time and cost issues. Since the current online purchasing system using credit card has security drawbacks, a security improvement is suggested in this work by implementing a model which integrate...
| Main Authors: | Naji, Ahmed Wathik, S. Housin, Anas, Zaidan, B. B., Zaidan, A. A., Abdel Hameed, Shihab |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academic Journals
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/6387/ http://irep.iium.edu.my/6387/1/Security_improvement_of_credit_card_online_purchasing_system.pdf |
Similar Items
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Beauty Is In the Eye of the Credit Card Holder? Antecedents of Credit Card Usage and Credit Card Debt
by: Tan, Shu Han
Published: (2017)
by: Tan, Shu Han
Published: (2017)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Differences between Islamic credit card and conventional credit card
by: Riyadi, Noerma Madjid, et al.
Published: (2011)
by: Riyadi, Noerma Madjid, et al.
Published: (2011)
Viability of Islamic credit card as an alternative to conventional credit card
by: Kassim, Salina
Published: (2010)
by: Kassim, Salina
Published: (2010)
Credit card holders in Malaysia: customer characteristics and credit card usage
by: Hussin, Siti Rahayu, et al.
Published: (2013)
by: Hussin, Siti Rahayu, et al.
Published: (2013)
Developing a prototype e-commerce application with credit card validation and secure transaction
by: M. A., Ameedeen
Published: (2005)
by: M. A., Ameedeen
Published: (2005)
Allocating unauthorised credit card payment losses: the credit card guidelines and consumer protection
by: Abd Razak, Adilah, et al.
Published: (2009)
by: Abd Razak, Adilah, et al.
Published: (2009)
The application of credit cards in Islam
by: Soheng, Withaya, et al.
Published: (2011)
by: Soheng, Withaya, et al.
Published: (2011)
Chinese Credit Card Interest Rate: Recent Credit Card Pricing Model Progress and the Comparative Study
by: Wang, Ting
Published: (2008)
by: Wang, Ting
Published: (2008)
Effect of credit cards on customers' spending behavior: a comparative analysis of Islamic and conventional credit cards
by: Idris, Umar Muhammed, et al.
Published: (2013)
by: Idris, Umar Muhammed, et al.
Published: (2013)
Customers perception of credit card marketing strategies and its relationship with credit card usage among Malaysians
by: Kassim, Salina, et al.
Published: (2012)
by: Kassim, Salina, et al.
Published: (2012)
Maximizing Credit Card Customer Value
by: Ho, Wen Kuan
Published: (2005)
by: Ho, Wen Kuan
Published: (2005)
Factors affecting credit card usage
by: Syed Ahmad, Syed Sharaff
Published: (1998)
by: Syed Ahmad, Syed Sharaff
Published: (1998)
Factors Affecting Credit Card Usage
by: Syed Ahmad, Syed Sharaff
Published: (1998)
by: Syed Ahmad, Syed Sharaff
Published: (1998)
Credit card ownership and usage : satisfaction among card holders in Malaysia.
by: Hussin, Siti Rahayu, et al.
Published: (2012)
by: Hussin, Siti Rahayu, et al.
Published: (2012)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
The Security Issues Barrier Of E-Commerce In Malaysia: Malaysian Consumer Confidence In Using Credit Card Over The Internet
by: A. Rashid, Tajuddin
Published: (2004)
by: A. Rashid, Tajuddin
Published: (2004)
Current practices of Islamic credit cards in Malaysia
by: Uddin, Mohi, et al.
Published: (2017)
by: Uddin, Mohi, et al.
Published: (2017)
Concept of Islamic credit card based on Malaysia
by: Uddin, Mohi, et al.
Published: (2018)
by: Uddin, Mohi, et al.
Published: (2018)
Effects of Islamic credit cards on customer spending
by: Idris, Umar Muhammed
Published: (2013)
by: Idris, Umar Muhammed
Published: (2013)
Determinants of attitude towards credit card usage
by: Shafinar Ismail,, et al.
Published: (2014)
by: Shafinar Ismail,, et al.
Published: (2014)
Design and implementation of voice security system in MATLAB and JAVA
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Drivers of Credit Cards Adoption and Usage: An Exploratory Study
by: Chong, Seow Fun
Published: (2009)
by: Chong, Seow Fun
Published: (2009)
A review of Islamic credit card models in Malaysia
by: Mohd Noor, Azman, et al.
Published: (2010)
by: Mohd Noor, Azman, et al.
Published: (2010)
Credit card usage behavior among working student
by: Che Aniza Che Wel,, et al.
Published: (2015)
by: Che Aniza Che Wel,, et al.
Published: (2015)
RHB aims to reward credit card holders with prizes
Published: (2009)
Published: (2009)
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Automatic smart card purchasing system for express kiosk
by: Toha, Siti Fauziah, et al.
Published: (2011)
by: Toha, Siti Fauziah, et al.
Published: (2011)
BATTLE OF THE THREE SINGAPORE LOCAL BANKS IN THE CREDIT CARD INDUSTRY: SINGAPORE LADIES CARD MARKET
by: Wee, Eileen
Published: (2006)
by: Wee, Eileen
Published: (2006)
An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
An overview: laser applications in dentistry
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Similar Items
-
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009) -
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010)