Jin-Cherng Lin

Learn More
Injection attack is a technique to inject codes into a computer program or system by taking advantage of the unchecked assumptions the system makes about its inputs. The purpose of the injected code is typically to bypass or modify the originally intended functionality of the program. It is popular in system hacking or cracking to gain information,(More)
In the last years, demand for high-speed Internet access and multimedia service has increased greatly. The IEEE 802.16 Working Group on broadband wireless access is developing the IEEE 802.16 standards for wireless metropolitan area networks. IEEE 802.16 aims at providing broadband wireless last-mile access in a Metropolitan Area Network, easy deployment,(More)
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a network; rather, the question to ask is if security has been implemented properly and the interoperability with today’s network architecture. Although there are various ways to perform(More)
In the IT industry, precisely evaluate the effort of each software development project to develop cost and development schedule management to the software company in the software are count for much. Since a project, majority of development teams will feel time isn't enough to use or the project valuation be false to make the software project failed. However(More)
When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage secret keys and also requires software upgrade only instead of changing hardware equipment. However, implementing TKIP on the exiting equipment, the transmission performance is(More)
Many web application security vulnerabilities result from generic input validation problems. Examples of such vulnerabilities are SQL injection and Cross-Site Scripting (XSS). Some sites attempt to protect themselves by filtering malicious input, but a surprising number of web applications have used no mechanisms to validate input. We have developed a(More)