An Effective Cardless Atm Transaction Using Computer Vision Techniques

P Priya, R Jeeva, MM Pradeep… - 2023 9th International …, 2023 - ieeexplore.ieee.org
Rapider responses are required from ATM banking suppliers to security requests. The
current network environment has made it easier for hackers to engage in illicit activity. One …

[PDF][PDF] SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network.

S Nashwan - International Arab Journal of Information Technology …, 2017 - iajit.org
3rdGeneration Partnership Project (3GPP) has proposed the Authentication and Key
Agreement (AKA) protocol to achieve the security requirements of Evolved Packet System …

[PDF][PDF] Secure authentication protocol for NFC mobile payment systems

S Nashwan - International Journal of Computer Science and …, 2017 - researchgate.net
Summary Near Field Communication (NFC) is an attractive technology which is used in
several countries for contactless payment operations via mobiles. This technology is …

[PDF][PDF] Performance analysis of SAP-NFC protocol

M Al-Fayoumi, S Nashwan - International Journal of …, 2018 - researchgate.net
Near field communication (NFC) is a wireless communication technology. It is one of the
most recent technologies that offers great and varied promise in the area of application …

[PDF][PDF] Formal analysis of MCAP protocol against replay attack

S Nashwan, B Alshammari - British Journal of Mathematics & …, 2017 - researchgate.net
Replay attack is considered a common attacking technique that is used by adversaries to
gain access to confidential information. Several approaches have been proposed to prevent …

[PDF][PDF] SE-H: Secure and efficient hash protocol for RFID system

S Nashwan - … Journal of Communication Networks and Information …, 2017 - researchgate.net
The Radio Frequency Identification (RFID) systems are suffered from the growing of security
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …

[PDF][PDF] Synchronous authentication key management scheme for Inter-eNB handover over LTE networks

S Nashwan - … Journal of Advanced Computer Science and …, 2017 - pdfs.semanticscholar.org
Handover process execution without active session termination is considered one of the
most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this …

[PDF][PDF] Identification of password strength and time analysis for hacking the generated key: a survey

BP Kumar, ES Reddy - Int J Anal Exp Modal Anal XI (VII), 2019 - researchgate.net
The protection that passwords offer may be deeply compromised due to the way people
struggle with trying to memorize and retain their passwords. Throughout our everyday lives …

An Experimental Study on the Role of Password Strength and Cognitive Load on Employee Productivity

S Mujeye - 2016 - search.proquest.com
The proliferation of information systems (IS) over the past decades has increased the
demand for system authentication. While the majority of system authentications are …