Security in next generation mobile payment systems: A comprehensive survey

W Ahmed, A Rasool, AR Javed, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Cash payment is still king in several markets, accounting for more than 90% of the payments
in almost all the develo** countries. The usage of mobile phones is pretty ordinary in this …

[PDF][PDF] A Comprehensive review on cybersecurity issues and their mitigation measures in FinTech

G Ali, MM Mijwil, BA Buruga, M Abotaleb - 2024 - iasj.net
The fourth industrial revolution has seen the evolution and wide adoption of game-changing
and disruptive innovation" financial technologies (FinTech)" around the globe. However, the …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial Intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

[HTML][HTML] A secure and efficient multi-factor authentication algorithm for mobile money applications

G Ali, MA Dida, A Elikana Sam - Future Internet, 2021 - mdpi.com
With the expansion of smartphone and financial technologies (FinTech), mobile money
emerged to improve financial inclusion in many develo** nations. The majority of the …

[Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems

D Nigam, SN Patel, PMD Raj Vincent… - Journal of …, 2022 - Wiley Online Library
Secure identification is a critical system requirement for patients seeking health‐related
services. In the event of critical, aged, or disabled patients who require frequent health …

[HTML][HTML] Blockchain-supported online banking scheme

CH Tsai, DK Liou, HL Lee - Egyptian Informatics Journal, 2024 - Elsevier
Online banking not merely enables customers to make transactions within a short time and
access transactional information anywhere but also facilitates financial institutions to simplify …

Survey on Reverse‐Engineering Tools for Android Mobile Devices

A Albakri, H Fatima, M Mohammed… - Mathematical …, 2022 - Wiley Online Library
With the presence of the Internet and the frequent use of mobile devices to send several
transactions that involve personal and sensitive information, it becomes of great importance …

eKichabi v2: Designing and Scaling a Dual-Platform Agricultural Technology in Rural Tanzania

A Raghunath, AL Metzger, H Easton, XM Liu… - Proceedings of the …, 2024 - dl.acm.org
Although farmers in Sub-Saharan Africa are accessing feature phones and smartphones at
historically high rates, they face challenges finding a robust network of agricultural contacts …

A survey on user authentication factors

AAS AlQahtani, Z El-Awadi… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
Today, digital information decisively permeates all aspects of modern society. In such a
connected world, one of the critical factors in maintaining the security of transmitted data is …

A novel two-factor honeytoken authentication mechanism

V Papaspirou, L Maglaras, MA Ferrag… - 2021 International …, 2021 - ieeexplore.ieee.org
The majority of systems rely on user authentication on passwords, but passwords have so
many weaknesses and widespread use that easily raise significant security concerns …