Al-Fairuz, 2011 - Google Patents
An investigation into the usability and acceptability of multi-channel authentication to online banking users in OmanAl-Fairuz, 2011
View PDF- Document ID
- 10844393314898023588
- Author
- Al-Fairuz M
- Publication year
External Links
Snippet
Authentication mechanisms provide the cornerstone for security for many distributed systems, especially for increasingly popular online applications. For decades, widely used, traditional authentication methods included passwords and PINs that are now inadequate to …
- 238000009114 investigational therapy 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ulqinaku et al. | Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols | |
Andress | Foundations of information security: a straightforward introduction | |
Steel et al. | Core security patterns: best practices and strategies for J2EE", web services, and identity management | |
JP4778899B2 (en) | System and method for risk-based authentication | |
Ali et al. | A comprehensive review on cybersecurity issues and their mitigation measures in FinTech | |
Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
Blanco Hache et al. | ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Fang et al. | Security measures applied on digital banking towards service improvement proposal | |
Kajave et al. | How Cyber Criminal Use Social Engineering To Target Organizations | |
US20100153275A1 (en) | Method and apparatus for throttling access using small payments | |
Castell | Mitigating online account takeovers: The case for education | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Tolbert et al. | Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems | |
Hegt | Analysis of current and future phishing attacks on internet banking services | |
Al-Fairuz | An investigation into the usability and acceptability of multi-channel authentication to online banking users in Oman | |
Al Fairuz et al. | Multi-channel, Multi-level Authentication for More Secure eBanking. | |
Khadilkar | Securing Internet Banking Against Data Phishing Using Cryptography | |
Chen | Trust management for a smart card based private eid manager | |
Saini | Comparative analysis of top 5, 2-factor authentication solutions | |
Aiden et al. | Social Engineering Attacks: Detection and Prevention | |
Kitime | A framework of cybersecurity risks on mobile money users in Tanzania: A case study of dodoma city | |
Michalow | Analysis of the impact of technological advances on financial institutions | |
Utakrit | Security awareness by online banking users in Western Australian of phishing attacks | |
Mujinga | Towards a Framework to Promote the Development of Secure and Usable Online Information Security Applications |