Explaining the workings principle of cloud-based multi-factor authentication architecture on banking sectors

R Bose, S Chakraborty, S Roy - 2019 Amity International …, 2019 - ieeexplore.ieee.org
Already in the initial years of the 21 st century, Cloud Computing has left an indelible mark
as one of the key emergent technologies that already has begun revolutionizing the way we …

[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment

D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …

Mobile cloud computing framework for securing data

AA Ikram, AR Javed, M Rizwan, R Abid… - 2021 44th …, 2021 - ieeexplore.ieee.org
Mobile cloud computing provides on-demand resources. The architecture of mobile cloud
computing is composed of a cluster of mobile devices. It is gaining popularity because of its …

Efficient mobile security for E health care application in cloud for secure payment using key distribution

A Saranya, R Naresh - Neural Processing Letters, 2023 - Springer
Through the growing attractiveness of the financial world, the e health care application has
developed quicker than the previous period, such that mobile payment adore extraordinary …

Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway

S Nagaraju, L Parthiban - Journal of Cloud Computing, 2015 - Springer
Cloud computing is an emerging, revenue generating and internet based technology, where
computing power, storage and other resources are provided to the stakeholders in a single …

A survey on the security in cyber physical system with multi-factor authentication

M Sain, O Normurodov, C Hong… - 2021 23rd international …, 2021 - ieeexplore.ieee.org
Cyber-physical Systems can be defined as a complex networked control system, which
normally develop by combining several physical components with the cyber space. Cyber …

Two-factor authentication for voice assistance in digital banking using public cloud services

V Vassilev, A Phipps, M Lane… - … on Cloud Computing …, 2020 - ieeexplore.ieee.org
This paper presents the results of a research on using voice assistants to enable financial
and commercial operations which require authentication with increased level of security …

An intrusion detection system based secured electronic service delivery model

S Biswas, A Roy - 2019 3rd international conference on …, 2019 - ieeexplore.ieee.org
Emergence of Information and Communication Technology (ICT) has facilitated its users to
access electronic services through open channel like Internet. This approach of digital …

Two-factor authentication framework for private cloud

I Gordin, A Graur, A Potorac - 2019 23rd international …, 2019 - ieeexplore.ieee.org
Authorizing access to the public cloud has evolved over the last few years, from simple user
authentication and password authentication to two-factor authentication (TOTP), with the …

A survey on mobile payment request verification over cloud using key distribution

A Saranya, R Naresh - … on Recent Trends in Computer Science …, 2022 - ieeexplore.ieee.org
Payment request examination of some of the cryptography's most widely used encryption
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …