Explaining the workings principle of cloud-based multi-factor authentication architecture on banking sectors

R Bose, S Chakraborty, S Roy - 2019 Amity International …, 2019 - ieeexplore.ieee.org
Already in the initial years of the 21 st century, Cloud Computing has left an indelible mark
as one of the key emergent technologies that already has begun revolutionizing the way we …

Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment

M Vivekanandan, S VN, SR U - Peer-to-Peer Networking and Applications, 2021 - Springer
The development in cloud computing platforms has resulted, hosting many day-to-day
service applications in the cloud. To avail the services provided by different cloud service …

Intelligent Blockchain-Based Secure Framework for Transaction in Mobile Electronic Payment System.

A Mohamed - International Journal of Interactive Mobile …, 2023 - search.ebscohost.com
The rate of smartphone purchases is rising daily, and mobile payments are now frequently
accepted in various areas. It is essential to transfer money completely safe as well as quick …

Dynamic reciprocal authentication protocol for mobile cloud computing

AA Ahmed, K Wendy, MN Kabir… - IEEE Systems …, 2020 - ieeexplore.ieee.org
A combination of mobile and cloud computing delivers many advantages such as mobility,
resources, and accessibility through seamless data transmission via the Internet anywhere …

A lightweight and secure NFC‐base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification

C Thammarat, W Kurutach - International Journal of …, 2019 - Wiley Online Library
During the past few years, many near‐field communication (NFC) mobile payment protocols
have been widely used and received more and more attentions. This could be an essential …

Efficient and secure NFC authentication for mobile payment ensuring fair exchange protocol

C Thammarat - Symmetry, 2020 - mdpi.com
The standard protocol of near field communication (NFC) has concentrated primarily on the
speed of communication while ignoring security properties. Message between an NFC …

Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system'with nonce verification

Z Siddiqui, AH Abdullah, MK Khan… - Peer-to-Peer Networking …, 2016 - Springer
In 2009, Xu et al. presented an improved smartcard based authentication scheme while
using a security model previously applied by Bellare et al. to prove the security of their …

Review and comparison of mobile payment protocol

P Pukkasenung, R Chokngamwong - Advances in Parallel and Distributed …, 2016 - Springer
Mobile phones are getting smarter and people have been using them for many different
proposes. Recently, more and more people have begun using their mobile phones as a …

Multilevel Authentication based Data Security and Verification over Cloud Computing Environment

D Soni, N Mishra - International Journal of Education and …, 2017 - search.proquest.com
There are various algorithm proposed in the area of cloud computing environment. Now a
days the cloud computing is the very interesting area for research purpose. Cloud computing …

Scheme and applications of mobile payment based on 3-D security protocol

C Yang, M Qi - Proceedings of the 3rd international conference on …, 2006 - dl.acm.org
Considering the requirement of the development of mobile business, it improves the system
structure, predigests the transaction flow, promotes the security, introduces the applications …