[1]
M. Arora, “E-Security Issues”, IJCT, vol. 3, no. 2, pp. 301–308, Oct. 2012.