Device identity-based user authentication on electronic payment system for secure E-wallet apps

MA Hassan, Z Shukur - Electronics, 2021 - mdpi.com
E-wallets are a modern electronic payment system technology that easily recognize
consumer interest, making our transactions very convenient and efficient. E-wallets are …

Persistent mobileapp-in-the-middle (maitm) attack

C Catalano, F Tommasi - Journal of Computer Virology and Hacking …, 2024 - Springer
The recent publication of the “Browser in the Middle” attack has demonstrated an effective
way to compromise a good number of variants of Multifactor Authentication and to control the …

Towards the evaluation of authentication protocols for mobile command and control unit in healthcare

N Zaman, M Ahmad - Journal of Medical Imaging and Health …, 2017 - ingentaconnect.com
Command and Control systems are playing very important role in any critical situation.
These systems help in situation awareness, decision making, and prompt response in …

Enhancing multi-factor user authentication for electronic payments

M Arif Hassan, Z Shukur, M Kamrul Hasan - Inventive Computation and …, 2021 - Springer
Security is beginning to be more and more important for electronic transaction nowadays,
and the need for security is becoming more important than ever before. A variety of …

Robust login authentication using time-based OTP through secure tunnel

N Kaur, M Devgan, S Bhushan - 2016 3rd International …, 2016 - ieeexplore.ieee.org
Security sensitive environments or organizations prevent their resources from unauthorized
access by enabling various access control mechanisms like user authentication. Initially the …

A Systematic Review of User Authentication Security in Electronic Payment System

MA Hassan, Z Shukur - Proceedings of International Conference on Data …, 2023 - Springer
Recently, security is becoming an increasingly crucial component of any financial
organization, and as a result, the need for authentication has expanded. To ensure the …

[PDF][PDF] Digital dissemination of information about mosque activities to communities

NA Asri, MA Mohamed, AR Mamat… - International Journal of …, 2018 - academia.edu
Android conveniently provides a platform for a variety of usage as an information highway
application. Currently there is a lacking in tools and technology that is responsible for …

[PDF][PDF] UNIVERSITA DEL SALENTO

C Catalano - researchgate.net
Negli ultimi anni, le minacce informatiche hanno assunto molteplici varianti, dalla campagna
ramsomware [81, 74], agli attacchi verso la disponibilita del servizio erogato Denial of …

[PDF][PDF] Automação de Autenticação para Testes de Segurança em Aplicações Web no ZAP

LSC Sacramento, Í Cunha, GP de Oliveira Cardoso… - gt-crivo.dcc.ufmg.br
Running exhaustive vulnerability tests on Web applications requires an authenticated user
session. Authentication is usually configured manually by a security expert and is …

Biometrics Iris Recognition And Two-Factor Authentication For Login System

NSB Shaari, D Abdullah - Journal of Computing Technologies and …, 2022 - jtec.org.my
Traditional username and password authentication were easily compromised and had
caused a breach of data. Research shows that two-factor authentication and biometrics …