Systematic survey of mobile payments, protocols, and security infrastructure

S Bojjagani, VN Sastry, CM Chen, S Kumari… - Journal of Ambient …, 2023 - Springer
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shopping …

Security in next generation mobile payment systems: A comprehensive survey

W Ahmed, A Rasool, AR Javed, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Cash payment is still king in several markets, accounting for more than 90% of the payments
in almost all the developing countries. The usage of mobile phones is pretty ordinary in this …

Efficient and secure ECDSA algorithm and its applications: A survey

M Al-Zubaidie, Z Zhang, J Zhang - arXiv preprint arXiv:1902.10313, 2019 - arxiv.org
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic
curve digital signature algorithm (ECDSA) have been attracting attention from many …

A robust user authentication protocol with privacy-preserving for roaming service in mobility environments

R Shashidhara, S Bojjagani, AK Maurya… - Peer-to-peer networking …, 2020 - Springer
The authentication system plays a crucial role in the context of GLObal MObility NETwork
(GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service …

Role of authentication factors in Fin-tech mobile transaction security

HU Khan, M Sohail, S Nazir, T Hussain, B Shah, F Ali - Journal of Big Data, 2023 - Springer
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …

A secure end-to-end proximity NFC-based mobile payment protocol

S Bojjagani, VN Sastry - Computer Standards & Interfaces, 2019 - Elsevier
Abstract Near Field Communication (NFC) is one of the fast-growing technologies related to
proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that …

RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications

M Al-Zubaidie, Z Zhang, J Zhang - Security and …, 2019 - Wiley Online Library
Providing a mechanism to authenticate users in healthcare applications is an essential
security requirement to prevent both external and internal attackers from penetrating …

VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps

S Bojjagani, VN Sastry - 2017 IEEE 3rd international …, 2017 - ieeexplore.ieee.org
Mobile devices are becoming targets for hackers and malicious users due to the multifold
increase in its capabilities and usage. Security threats are more prominent in mobile …

PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification

S Bojjagani, DRD Brabin, PVV Rao - Procedia Computer Science, 2020 - Elsevier
In the mobile payment systems flow of confidential data is one of the essential and vital
services. The customer's sensitive data is always kept safe from the various kind of attacks …

A secure IoT-based micro-payment protocol for wearable devices

S Bojjagani, PVV Rao, DR Vemula, BR Reddy… - Peer-to-Peer Networking …, 2022 - Springer
Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the
Internet of things (IoT), contributing to a potential impact in the finance and banking sectors …