An integrated fuzzy model for evaluation and selection of mobile banking (m-banking) applications using new fuzzy-BWM and fuzzy-TOPSIS

PK Roy, K Shaw - Complex & Intelligent Systems, 2021 - Springer
Mobile technology has revolutionised various business processes. Banking is one of them.
Traditional banking operations are gradually changing with the introduction of efficient …

A survey on trends of two-factor authentication

D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak
authentication schemes, user's poor password management experience, and attacks such …

A fuzzy MCDM decision-making model for m-banking evaluations: comparing several m-banking applications

P Roy, K Shaw - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Mobile banking (m-banking) is one of the most recent creative banking channels that
provide many advantages to both consumers and financial institutions regarding banking …

Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services

OO Olakanmi, K Odeyemi - Computers & Security, 2021 - Elsevier
Mobile cloud computing (MCC) combines mobile devices with cloud computing for efficient
extension of infrastructures and cloud services to mobile devices using the existing mobile …

Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks

IM Tas, S Baktir - IEEE Access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …

Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema

A Salim, AM Sagheer, L Yaseen - International Conference on Applied …, 2019 - Springer
Mobile banking relies on the Internet for transfer data between the customer's device and
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …

A study of two-way authentication for decentralized network identities

Y Lu, X Zhang, C Zhang, S Dai, P Ma… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The rapid development of the Internet has posed a more serious challenge to
communication. The widely used authentication scheme is now a centralized authentication …

Smart card security mechanism with dynamic key

N Noprianto, VN Wijayaningrum - JURNAL INFOTEL, 2021 - ejournal.ittelkom-pwt.ac.id
As a currently popular technology, the use of smart cards continues to increase in various
fields and the rapid development of technology. Therefore, data security stored on a smart …

Consumers perspectives on using biometric technology with mobile banking

RA Clark - 2021 - search.proquest.com
The need for applying biometric technology in mobile banking is increasing due to emerging
security issues, and many banks' chief executive officers have integrated biometric solutions …

Security Model For Data On Transit In Mobile Banking Applications

DO Orucho - 2024 - repository.kisiiuniversity.ac.ke
Mobile banking applications is an advanced technology within mobile banking that exploits
the use of wireless and cellular networks to deliver banking services to users with increased …