Abiodun et al., 2022 - Google Patents
Securing digital transaction using a three-level authentication systemAbiodun et al., 2022
- Document ID
- 3258252403806943865
- Author
- Abiodun M
- Awotunde J
- Adeniyi A
- Ademuagun D
- Aremu D
- Publication year
- Publication venue
- International Conference on Computational Science and Its Applications
External Links
Snippet
In today's world, the rate at which people are transacting on the internet is rapidly increasing, but the majority of people are concerned with the security of the system. Shoulder-surfing, physical observation, keypad overlays, skimming attacks, etc. are the most common threats …
- 238000000034 method 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parmar et al. | A comprehensive study on passwordless authentication | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
US9577999B1 (en) | Enhanced security for registration of authentication devices | |
EP2605567B1 (en) | Methods and systems for increasing the security of network-based transactions | |
Al Abdulwahid et al. | Continuous and transparent multimodal authentication: reviewing the state of the art | |
US20230262054A1 (en) | Method and system for user authentication via an authentication factor integrating fingerprints and personal identification numbers | |
Abiodun et al. | Securing digital transaction using a three-level authentication system | |
Khan et al. | Comparative study of authentication techniques | |
US12430415B1 (en) | Authentication with dynamic user identification | |
Nath et al. | Issues and challenges in two factor authentication algorithms | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Boonkrong | Multi-factor authentication | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
KR102633314B1 (en) | method and apparatus for processing authentication information and user terminal including the same | |
Phan | Implementing resiliency of adaptive multi-factor authentication systems | |
Ng | Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities: Emerging Research and Opportunities | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
KR102284876B1 (en) | System and method for federated authentication based on biometrics | |
Dasgupta et al. | Authentication Basics: Key to the kingdom–Access a Computing System | |
Roy et al. | Biometrics data security techniques for portable mobile devices | |
Sabater | Biometrics as password alternative | |
Chude et al. | Multi-factor Authentication for Physical Access | |
Khanna | Authentication in Cybersecurity | |
US10491391B1 (en) | Feedback-based data security | |
Matei-Dimitrie | Multi-factor authentication. An extended overview |