[go: up one dir, main page]

Darwish et al., 2012 - Google Patents

A model to authenticate requests for online banking transactions

Darwish et al., 2012

View HTML
Document ID
10829166701074219338
Author
Darwish S
Hassan A
Publication year
Publication venue
Alexandria Engineering Journal

External Links

Snippet

As the number of clients using online banking increases, online banking systems are becoming more desirable targets for attacks. To maintain the clients trust and confidence in the security of their online banking services; financial institutions must identify how attackers …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Similar Documents

Publication Publication Date Title
JP4833489B2 (en) System, method and software for remote password authentication using multiple servers
US8670563B2 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
WO2006010007A1 (en) Systems and methods for binding a hardware component and a platform
US20250202688A1 (en) Quantum key transmission method, apparatus, and system
CN116633530A (en) Quantum key transmission method, device and system
CN102164033A (en) Method, device and system for preventing services from being attacked
Zhang et al. BCAE: A blockchain-based cross domain authentication scheme for edge computing
CN101867473B (en) Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal
CN114095229B (en) Method, device and system for constructing data transmission protocol of energy internet
Darwish et al. A model to authenticate requests for online banking transactions
Chaudhary et al. E-commerce security through asymmetric key algorithm
Singh et al. Analysis of cryptographically replay attacks and its mitigation mechanism
Accorsi et al. Delegating secure logging in pervasive computing systems
Akram et al. A secure and trusted channel protocol for the user centric smart card ownership model
CN101827079A (en) Blocking and attacking-resistant terminal connection building method and terminal access authenticating system
CN106973067A (en) A kind of platform environment integrality detection method and device
Mayes et al. Information security best practices
Patel et al. Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant
Shojaie et al. Improving EAP-TLS performance using cryptographic methods
Téllez et al. Security in mobile payment systems
WO2009133869A1 (en) Two-element authentication system
Lan et al. An anonymous remote attestation protocol to prevent masquerading attack
Yang et al. An enterprise digital right management scheme with anonymous trust for mobile devices
Dorey et al. Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
CN106953733A (en) A kind of platform software integrity certification method and apparatus