Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …

A review on electronic payments security

MA Hassan, Z Shukur, MK Hasan, AS Al-Khaleefa - Symmetry, 2020 - mdpi.com
Modern technology is turning into an essential element in the financial trade. We focus the
emphasis of this review on the research on the E-wallet and online payment, which is an …

An efficient secure electronic payment system for e-commerce

MA Hassan, Z Shukur, MK Hasan - computers, 2020 - mdpi.com
E-commerce implies an electronic purchasing and marketing process online by using typical
Web browsers. As e-commerce is quickly developing on the planet, particularly in recent …

Device identity-based user authentication on electronic payment system for secure E-wallet apps

MA Hassan, Z Shukur - Electronics, 2021 - mdpi.com
E-wallets are a modern electronic payment system technology that easily recognize
consumer interest, making our transactions very convenient and efficient. E-wallets are …

Multifactor authentication protocol in a mobile environment

M Bartłomiejczyk, M Kurkowski - IEEE Access, 2019 - ieeexplore.ieee.org
The implementation of services that process confidential data in a mobile environment
requires an adequate level of security with the strictest possible mechanisms of information …

An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications

AM Gamundani, A Phillips… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Internet of things (IoT) are finding their wide use in various domains. IoT implementation in
the Smart home domain is one that is complex as the devices that are being used in such …

Multifactor Authentication Schemes for Multiserver Based Wireless Application: A Review

Y Nogia, S Singh, V Tyagi - 2023 Third International …, 2023 - ieeexplore.ieee.org
Multifactor Authentication (MFA) schemes for securing communication in wireless
applications have gained popularity in Research academia and enterprises. MFA schemes …

[PDF][PDF] Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking

BVB Manjula, RL Naik - International Journal of Future Generation …, 2021 - researchgate.net
In present Mobile banking is most popular and efficient in banking Sector. The present
mobile banking includes mobile accounting, mobile financial services, and mobile …

Enhancing multi-factor user authentication for electronic payments

M Arif Hassan, Z Shukur, M Kamrul Hasan - Inventive Computation and …, 2021 - Springer
Security is beginning to be more and more important for electronic transaction nowadays,
and the need for security is becoming more important than ever before. A variety of …

A study of data threats and the role of cryptography algorithms

SS Thapar, H Sarangal - 2018 IEEE 9th Annual Information …, 2018 - ieeexplore.ieee.org
The digital world is engulfed by the imminent threat from digital perpetrators. Cryptography
and authentication is necessary for digital communication to make sure that connecting …