{"created":"2020-09-01T13:47:43.761216+00:00","id":3939,"links":{},"metadata":{"_buckets":{"deposit":"2c14a898-03ce-481f-969f-79a998488644"},"_deposit":{"id":"3939","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3939"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3939","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Protecting Credit Card Confidentiality Using Encryption","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cryptography makes secure websites and electronicsafe transmission possible. For a web site to be secure all of thedata transmitted between the computers where the data is keptand where it is received must be encrypted. This allows peopleto make purchases for online shopping with their credit cards,without worrying that any of their account information is beingcompromised. The prevention of credit card fraud is animportant application for online shopping process. Therefore,online shopping stores need to validate credit card with creditcard validation servers. Moreover, while transferring creditcard data over the communication channel, some threats mayalso occur. Credit card validation servers provide secured webservices for the credit card fraud prevention. This systempresents how to send credit card number and password securityfrom online stores to credit card validation servers for validitychecks. Triple DES algorithm will be used for secure sendingover the communication channel. Triple DES provides efficientand secured modification of DES algorithms and its symmetricalgorithm."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Protecting Credit Card Confidentiality Using Encryption.pdf","filesize":[{"value":"11 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3939/files/Protecting Credit Card Confidentiality Using Encryption.pdf"},"version_id":"195f4a0d-1c99-4d4d-b298-0c27487f071f"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Yin Pa Pa"},{"subitem_authors_fullname":"Htoo, Nay Zar Chi"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1657"},"item_title":"Protecting Credit Card Confidentiality Using Encryption","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3939","relation_version_is_last":true,"title":["Protecting Credit Card Confidentiality Using Encryption"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:50:06.629943+00:00"}