[HTML][HTML] A broad review on non-intrusive active user authentication in biometrics

PA Thomas, K Preetha Mathew - Journal of Ambient Intelligence and …, 2023 - Springer
Authentication is the process of keeping the user's personal information as confidential in
digital applications. Moreover, the user authentication process in the digital platform is …

[HTML][HTML] Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

Cybercrime and society

M Yar, KF Steinmetz - 2023 - torrossa.com
The previous chapters explored cybercriminal activities associated with computer intrusion
and manipulation, which are generally labelled as hacking. This chapter critically explores …

[HTML][HTML] BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities

MO Ahmad, G Tripathi, F Siddiqui, MA Alam, MA Ahad… - Sensors, 2023 - mdpi.com
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …

[HTML][HTML] Antecedents of behavioural intention to adopt internet banking using structural equation modelling

S Inder, K Sood, S Grima - Journal of Risk and Financial Management, 2022 - mdpi.com
Technology is emerging as an as an important banking mode for customers, and although
almost all the banks in India are offering Internet Banking, India faces problems related to …

[HTML][HTML] A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

Cyber hygiene knowledge, awareness, and behavioral practices of university students

S Baraković, J Baraković Husić - Information Security Journal: A …, 2023 - Taylor & Francis
Personal data is valuable and vulnerable to individuals who have wrong intentions as any
other possessions. This can be mitigated by good cyber hygiene habits. The main aim of this …

RESEAP: An ECC-based authentication and key agreement scheme for IoT applications

M Safkhani, N Bagheri, S Kumari, H Tavakoli… - IEEE …, 2020 - ieeexplore.ieee.org
Although the Internet of Things (IoT) provides many benefits for our life but it also raises
many security threats. The main risk is the security of the transferred data comprising very …

[HTML][HTML] Role of authentication factors in Fin-tech mobile transaction security

HU Khan, M Sohail, S Nazir, T Hussain, B Shah, F Ali - Journal of Big Data, 2023 - Springer
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …

[HTML][HTML] An integrated fuzzy model for evaluation and selection of mobile banking (m-banking) applications using new fuzzy-BWM and fuzzy-TOPSIS

PK Roy, K Shaw - Complex & Intelligent Systems, 2021 - Springer
Mobile technology has revolutionised various business processes. Banking is one of them.
Traditional banking operations are gradually changing with the introduction of efficient …