Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
State of the art: secure mobile payment
W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …
and anywhere. While providing great convenience, mobile payment also brings many …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
Recent cyber security attacks and their mitigation approaches–an overview
A Chowdhury - Applications and Techniques in Information Security …, 2016 - Springer
The advent of digital media, Internet, web and online social media has drawn the attention of
relevant research community significantly and created many new research challenges on …
relevant research community significantly and created many new research challenges on …
[PDF][PDF] EMV in a nutshell
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …
The EMV standard: Break, fix, verify
EMV is the international protocol standard for smartcard payment and is used in over 9
billion cards worldwide. Despite the standard's advertised security, various issues have …
billion cards worldwide. Despite the standard's advertised security, various issues have …
Security Enhanced EMV‐Based Mobile Payment Protocol
MH Yang - The Scientific World Journal, 2014 - Wiley Online Library
Near field communication has enabled customers to put their credit cards into a smartphone
and use the phone for credit card transaction. But EMV contactless payment allows …
and use the phone for credit card transaction. But EMV contactless payment allows …
A survey on contactless smart cards and payment system: Technologies, policies, attacks and countermeasures
BB Gupta, S Narayan - Journal of Global Information Management …, 2020 - igi-global.com
In recent years, contactless transactions have risen rapidly. It includes NFC, MST,
contactless cards, and many other payment methods. These payment methods have certain …
contactless cards, and many other payment methods. These payment methods have certain …
Security certification in payment card industry: Testbeds, measurements, and recommendations
The massive payment card industry (PCI) involves various entities such as merchants, issuer
banks, acquirer banks, and card brands. Ensuring security for all entities that process …
banks, acquirer banks, and card brands. Ensuring security for all entities that process …
Practical threshold multi-factor authentication
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets.
Unlike single-factor authentication (eg, password-only login),-factor authentication (FA) …
Unlike single-factor authentication (eg, password-only login),-factor authentication (FA) …