Security in next generation mobile payment systems: A comprehensive survey

W Ahmed, A Rasool, AR Javed, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Cash payment is still king in several markets, accounting for more than 90% of the payments
in almost all the developing countries. The usage of mobile phones is pretty ordinary in this …

[Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems

D Nigam, SN Patel, PMD Raj Vincent… - Journal of …, 2022 - Wiley Online Library
Secure identification is a critical system requirement for patients seeking health‐related
services. In the event of critical, aged, or disabled patients who require frequent health …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

A secure and efficient multi-factor authentication algorithm for mobile money applications

G Ali, MA Dida, A Elikana Sam - Future Internet, 2021 - mdpi.com
With the expansion of smartphone and financial technologies (FinTech), mobile money
emerged to improve financial inclusion in many developing nations. The majority of the …

[HTML][HTML] Blockchain-supported online banking scheme

CH Tsai, DK Liou, HL Lee - Egyptian Informatics Journal, 2024 - Elsevier
Online banking not merely enables customers to make transactions within a short time and
access transactional information anywhere but also facilitates financial institutions to simplify …

Survey on Reverse‐Engineering Tools for Android Mobile Devices

A Albakri, H Fatima, M Mohammed… - Mathematical …, 2022 - Wiley Online Library
With the presence of the Internet and the frequent use of mobile devices to send several
transactions that involve personal and sensitive information, it becomes of great importance …

2-D Threshold Hyperchaotic Map and Application in Timed One-Time Password

H Bao, Y Su, Z Hua, Q Xu, M Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The design of hyperchaotic systems with complex dynamics and ultrawide parameter space
has been a research hotspot. In this article, we propose a 2-D threshold discrete map model …

A survey on user authentication factors

AAS AlQahtani, Z El-Awadi… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
Today, digital information decisively permeates all aspects of modern society. In such a
connected world, one of the critical factors in maintaining the security of transmitted data is …

A novel two-factor honeytoken authentication mechanism

V Papaspirou, L Maglaras, MA Ferrag… - 2021 International …, 2021 - ieeexplore.ieee.org
The majority of systems rely on user authentication on passwords, but passwords have so
many weaknesses and widespread use that easily raise significant security concerns …

Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic Flow

M Machoke, J Mbelwa, J Agbinya, AE Sam - Engineering, Technology & …, 2022 - etasr.com
Network traffic classification is of significant importance. It helps identify network anomalies
and assists in taking measures to avoid them. However, classifying network traffic correctly is …