Defeating SQL injection attack in authentication security: an experimental study Debasish DasUtpal SharmaD. K. Bhattacharyya Regular Contribution 07 November 2017 Pages: 1 - 22
Design and implementation of Negative Authentication System Dipankar DasguptaAbhijit Kumar NagJohn R. Williams Regular Contribution 21 November 2017 Pages: 23 - 48
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications Anastasios StasinopoulosChristoforos NtantogianChristos Xenakis Regular Contribution 01 February 2018 Pages: 49 - 72
Differential audio analysis: a new side-channel attack on PIN pads Gerson de Souza FariaHae Yong Kim Regular Contribution 16 February 2018 Pages: 73 - 84
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM Abdelhak MesbahJean-Louis LanetMohamed Mezghiche Regular Contribution 22 February 2018 Pages: 85 - 100
Deployment and performance evaluation of mobile multicoupon solutions M. Francisca HinarejosAndreu-Pere Isern-DeyàLlorenç Huguet-Rotger Regular Contribution Open access 24 February 2018 Pages: 101 - 124