An integrated fuzzy model for evaluation and selection of mobile banking (m-banking) applications using new fuzzy-BWM and fuzzy-TOPSIS
Mobile technology has revolutionised various business processes. Banking is one of them.
Traditional banking operations are gradually changing with the introduction of efficient …
Traditional banking operations are gradually changing with the introduction of efficient …
A survey on trends of two-factor authentication
D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak
authentication schemes, user's poor password management experience, and attacks such …
authentication schemes, user's poor password management experience, and attacks such …
A fuzzy MCDM decision-making model for m-banking evaluations: comparing several m-banking applications
Mobile banking (m-banking) is one of the most recent creative banking channels that
provide many advantages to both consumers and financial institutions regarding banking …
provide many advantages to both consumers and financial institutions regarding banking …
Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services
OO Olakanmi, K Odeyemi - Computers & Security, 2021 - Elsevier
Mobile cloud computing (MCC) combines mobile devices with cloud computing for efficient
extension of infrastructures and cloud services to mobile devices using the existing mobile …
extension of infrastructures and cloud services to mobile devices using the existing mobile …
Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks
IM Tas, S Baktir - IEEE Access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …
Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema
Mobile banking relies on the Internet for transfer data between the customer's device and
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …
A study of two-way authentication for decentralized network identities
Y Lu, X Zhang, C Zhang, S Dai, P Ma… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The rapid development of the Internet has posed a more serious challenge to
communication. The widely used authentication scheme is now a centralized authentication …
communication. The widely used authentication scheme is now a centralized authentication …
Smart card security mechanism with dynamic key
N Noprianto, VN Wijayaningrum - JURNAL INFOTEL, 2021 - ejournal.ittelkom-pwt.ac.id
As a currently popular technology, the use of smart cards continues to increase in various
fields and the rapid development of technology. Therefore, data security stored on a smart …
fields and the rapid development of technology. Therefore, data security stored on a smart …
Consumers perspectives on using biometric technology with mobile banking
RA Clark - 2021 - search.proquest.com
The need for applying biometric technology in mobile banking is increasing due to emerging
security issues, and many banks' chief executive officers have integrated biometric solutions …
security issues, and many banks' chief executive officers have integrated biometric solutions …
Security Model For Data On Transit In Mobile Banking Applications
DO Orucho - 2024 - repository.kisiiuniversity.ac.ke
Mobile banking applications is an advanced technology within mobile banking that exploits
the use of wireless and cellular networks to deliver banking services to users with increased …
the use of wireless and cellular networks to deliver banking services to users with increased …