Darwish et al., 2012 - Google Patents
A model to authenticate requests for online banking transactionsDarwish et al., 2012
View HTML- Document ID
- 10829166701074219338
- Author
- Darwish S
- Hassan A
- Publication year
- Publication venue
- Alexandria Engineering Journal
External Links
Snippet
As the number of clients using online banking increases, online banking systems are becoming more desirable targets for attacks. To maintain the clients trust and confidence in the security of their online banking services; financial institutions must identify how attackers …
- 238000000034 method 0 abstract description 11
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4833489B2 (en) | System, method and software for remote password authentication using multiple servers | |
US8670563B2 (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
WO2006010007A1 (en) | Systems and methods for binding a hardware component and a platform | |
US20250202688A1 (en) | Quantum key transmission method, apparatus, and system | |
CN116633530A (en) | Quantum key transmission method, device and system | |
CN102164033A (en) | Method, device and system for preventing services from being attacked | |
Zhang et al. | BCAE: A blockchain-based cross domain authentication scheme for edge computing | |
CN101867473B (en) | Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal | |
CN114095229B (en) | Method, device and system for constructing data transmission protocol of energy internet | |
Darwish et al. | A model to authenticate requests for online banking transactions | |
Chaudhary et al. | E-commerce security through asymmetric key algorithm | |
Singh et al. | Analysis of cryptographically replay attacks and its mitigation mechanism | |
Accorsi et al. | Delegating secure logging in pervasive computing systems | |
Akram et al. | A secure and trusted channel protocol for the user centric smart card ownership model | |
CN101827079A (en) | Blocking and attacking-resistant terminal connection building method and terminal access authenticating system | |
CN106973067A (en) | A kind of platform environment integrality detection method and device | |
Mayes et al. | Information security best practices | |
Patel et al. | Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant | |
Shojaie et al. | Improving EAP-TLS performance using cryptographic methods | |
Téllez et al. | Security in mobile payment systems | |
WO2009133869A1 (en) | Two-element authentication system | |
Lan et al. | An anonymous remote attestation protocol to prevent masquerading attack | |
Yang et al. | An enterprise digital right management scheme with anonymous trust for mobile devices | |
Dorey et al. | Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS | |
CN106953733A (en) | A kind of platform software integrity certification method and apparatus |