Blockchain-based caller-id authentication (bbca): A novel solution to prevent spoofing attacks in voip/sip networks

IM Tas, S Baktir - IEEE access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …

A survey on trends of two-factor authentication

D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak
authentication schemes, user's poor password management experience, and attacks such …

An integrated fuzzy model for evaluation and selection of mobile banking (m-banking) applications using new fuzzy-BWM and fuzzy-TOPSIS

PK Roy, K Shaw - Complex & Intelligent Systems, 2021 - Springer
Mobile technology has revolutionised various business processes. Banking is one of them.
Traditional banking operations are gradually changing with the introduction of efficient …

A fuzzy MCDM decision-making model for m-banking evaluations: comparing several m-banking applications

P Roy, K Shaw - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Mobile banking (m-banking) is one of the most recent creative banking channels that
provide many advantages to both consumers and financial institutions regarding banking …

Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services

OO Olakanmi, K Odeyemi - Computers & Security, 2021 - Elsevier
Mobile cloud computing (MCC) combines mobile devices with cloud computing for efficient
extension of infrastructures and cloud services to mobile devices using the existing mobile …

Auth4app: Protocols for identification and authentication using mobile applications

D Kreutz, R Fernandes, G Paz, T Jenuario… - Simpósio Brasileiro de …, 2020 - sol.sbc.org.br
The increasing adoption of mobile applications as a means of user authentication is
revealing new security challenges and opportunities. In order to modernize their physical …

Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema

A Salim, AM Sagheer, L Yaseen - International Conference on Applied …, 2019 - Springer
Mobile banking relies on the Internet for transfer data between the customer's device and
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …

S3AS: uma Soluà § ã o de Autenticaà § ã oe Autorizaà § ã o atravé s de Aplicativos de Smartphones

R Fernandes, G Paz, D Kretuz… - … Argentina-Brasil de …, 2020 - revistas.setrem.com.br
A crescente utilizaà § ã o de aplicativos, especialmente em dispositivosmóveis, como
forma de autenticaà § ã o de usuá rios está trazendo à tona novasoportunidades e …

A study of two-way authentication for decentralized network identities

Y Lu, X Zhang, C Zhang, S Dai, P Ma… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The rapid development of the Internet has posed a more serious challenge to
communication. The widely used authentication scheme is now a centralized authentication …

Smart card security mechanism with dynamic key

N Noprianto, VN Wijayaningrum - JURNAL INFOTEL, 2021 - ejournal.ittelkom-pwt.ac.id
As a currently popular technology, the use of smart cards continues to increase in various
fields and the rapid development of technology. Therefore, data security stored on a smart …