Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

State of the art: secure mobile payment

W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Recent cyber security attacks and their mitigation approaches–an overview

A Chowdhury - Applications and Techniques in Information Security …, 2016 - Springer
The advent of digital media, Internet, web and online social media has drawn the attention of
relevant research community significantly and created many new research challenges on …

[PDF][PDF] EMV in a nutshell

J Van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter - 2016 - cs.ru.nl
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …

The EMV standard: Break, fix, verify

D Basin, R Sasse, J Toro-Pozo - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
EMV is the international protocol standard for smartcard payment and is used in over 9
billion cards worldwide. Despite the standard's advertised security, various issues have …

Security Enhanced EMV‐Based Mobile Payment Protocol

MH Yang - The Scientific World Journal, 2014 - Wiley Online Library
Near field communication has enabled customers to put their credit cards into a smartphone
and use the phone for credit card transaction. But EMV contactless payment allows …

A survey on contactless smart cards and payment system: Technologies, policies, attacks and countermeasures

BB Gupta, S Narayan - Journal of Global Information Management …, 2020 - igi-global.com
In recent years, contactless transactions have risen rapidly. It includes NFC, MST,
contactless cards, and many other payment methods. These payment methods have certain …

Security certification in payment card industry: Testbeds, measurements, and recommendations

S Rahaman, G Wang, D Yao - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
The massive payment card industry (PCI) involves various entities such as merchants, issuer
banks, acquirer banks, and card brands. Ensuring security for all entities that process …

Practical threshold multi-factor authentication

W Li, H Cheng, P Wang, K Liang - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets.
Unlike single-factor authentication (eg, password-only login),-factor authentication (FA) …