[go: up one dir, main page]

Al-Fairuz, 2011 - Google Patents

An investigation into the usability and acceptability of multi-channel authentication to online banking users in Oman

Al-Fairuz, 2011

View PDF
Document ID
10844393314898023588
Author
Al-Fairuz M
Publication year

External Links

Snippet

Authentication mechanisms provide the cornerstone for security for many distributed systems, especially for increasingly popular online applications. For decades, widely used, traditional authentication methods included passwords and PINs that are now inadequate to …
Continue reading at theses.gla.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Similar Documents

Publication Publication Date Title
Ulqinaku et al. Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols
Andress Foundations of information security: a straightforward introduction
Steel et al. Core security patterns: best practices and strategies for J2EE", web services, and identity management
JP4778899B2 (en) System and method for risk-based authentication
Ali et al. A comprehensive review on cybersecurity issues and their mitigation measures in FinTech
Stewart CompTIA Security+ Review Guide: Exam SY0-601
Blanco Hache et al. ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud
Wilner et al. On the social science of ransomware: Technology, security, and society
Fang et al. Security measures applied on digital banking towards service improvement proposal
Kajave et al. How Cyber Criminal Use Social Engineering To Target Organizations
US20100153275A1 (en) Method and apparatus for throttling access using small payments
Castell Mitigating online account takeovers: The case for education
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Tolbert et al. Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems
Hegt Analysis of current and future phishing attacks on internet banking services
Al-Fairuz An investigation into the usability and acceptability of multi-channel authentication to online banking users in Oman
Al Fairuz et al. Multi-channel, Multi-level Authentication for More Secure eBanking.
Khadilkar Securing Internet Banking Against Data Phishing Using Cryptography
Chen Trust management for a smart card based private eid manager
Saini Comparative analysis of top 5, 2-factor authentication solutions
Aiden et al. Social Engineering Attacks: Detection and Prevention
Kitime A framework of cybersecurity risks on mobile money users in Tanzania: A case study of dodoma city
Michalow Analysis of the impact of technological advances on financial institutions
Utakrit Security awareness by online banking users in Western Australian of phishing attacks
Mujinga Towards a Framework to Promote the Development of Secure and Usable Online Information Security Applications