Kumar et al., 2014 - Google Patents
Migration, authentication and protection (MAP) of consumers and cardsKumar et al., 2014
- Document ID
- 6718514788927037678
- Author
- Kumar B
- Joseph P
- Dwivedi R
- Publication year
- Publication venue
- International Journal of Managment, IT and Engineering
External Links
Snippet
In preceding few years attacks on web services have developed from pretty simple credential stealing attacks to advanced content-manipulation attacks by means of malevolent software scattered on the client end-devices. The right long-term goal is to make …
- 230000005012 migration 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10991062B2 (en) | Secure authorization system | |
EP3073670B1 (en) | A system and a method for personal identification and verification | |
JP3228339U (en) | Personal authentication and verification system and method | |
JP2009048627A (en) | Method and apparatus for performing delegated transaction | |
CN107908932B (en) | Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm | |
KR102069849B1 (en) | Electronic wallet system for secure cryptocurrency transaction and the method thereof | |
US20130024377A1 (en) | Methods And Systems For Securing Transactions And Authenticating The Granting Of Permission To Perform Various Functions Over A Network | |
EP3378188B1 (en) | Protections for unauthorized copying (anti-cloning) method and system | |
Apriliani | Analysis of The Probability of Money Laundering Crimes toward the Development of Crypto-currency Regulations in Indonesia | |
Kumar et al. | Migration, authentication and protection (MAP) of consumers and cards | |
Ogiela et al. | Protocol for irreversible off-line transactions in anonymous electronic currency exchange | |
KR102689322B1 (en) | Method and system for certifying balance of digital asset | |
Zlati | Blockchain and criminal law; the fundamentals | |
Lohstroh | Why the equifax breach should not have mattered | |
GB2499269A (en) | Biometric information generation of a secure keychain | |
Prakash Yadav et al. | A Comprehensive Analysis of Threats and Countermeasures for Online Secure Transactions Using Blockchain | |
Arele et al. | A Survey on E-Payment using Quantum and Visual Cryptography. | |
Mundra et al. | Blockchain-Based Novel Solution for Online Fraud Prevention and Detection | |
Arnone | Security and Privacy in the Digital Currency Space | |
Scherzer | On the Quest to the Ultimate Digital Money | |
Akhtar et al. | Block Chain as Anti-Money Laundering Service | |
Wenninger et al. | Consumer Payments over Open Computer Networks, Research Paper 9603 | |
Graefe et al. | Credit card transaction security | |
Katta et al. | Model for Token Based Secure Transaction in ATM Networks. | |
Vrbanec et al. | DATA PROTECTION; IDENTIFICATION AND AUTHENTICATION IN APPLICATIONS AND PROTOCOLS |