2020
DOI: 10.1016/j.cose.2020.101745
|View full text |Cite
|
Sign up to set email alerts
|

A survey on multi-factor authentication for online banking in the wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 47 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…The three most used criteria categories that could be observed are those of security, usability, and costs. The application context was observed to be of importance as well, since most publications either directly considered it as a criterion [1] or were oriented to a specific application context [46][47][48][49]. An important finding from the realization of the second SLR is that the comparison and evaluation of authentication schemes and methods has been increasingly researched since 2017: more than half of the publications belonging to RQ3 and RQ4 are since this year.…”
Section: Discussionmentioning
confidence: 99%
“…The three most used criteria categories that could be observed are those of security, usability, and costs. The application context was observed to be of importance as well, since most publications either directly considered it as a criterion [1] or were oriented to a specific application context [46][47][48][49]. An important finding from the realization of the second SLR is that the comparison and evaluation of authentication schemes and methods has been increasingly researched since 2017: more than half of the publications belonging to RQ3 and RQ4 are since this year.…”
Section: Discussionmentioning
confidence: 99%
“…As the authentication protocol will be used to secure financial transactions, a critical requirement is that the proposed scheme must be strong enough to support online financial transactions, with a security level at least equal to the existing authentication methods that are used by banks [ 76 , 77 ].…”
Section: Autonomous Device Challenge Response Authenticationmentioning
confidence: 99%
“…Based on our use-case scenarios (cf. Section 3) and in relation to the capabilities that an attacker can have under the security assumptions of Section 4.4, we have identified a number of proximity and hacker attackers (inspired by the NIST threat model in [24] and [49]), which we list in Table 5. We model these attackers taking into account two aspects:…”
Section: Threat Modelmentioning
confidence: 99%