2012 Computing, Communications and Applications Conference 2012
DOI: 10.1109/comcomap.2012.6154013
|View full text |Cite
|
Sign up to set email alerts
|

Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…[1,6] uses QR code in the transaction, which can be forged by attackers easily. In [5,[13][14][15], the other parties cannot detect double-spending.…”
Section: Double-spending Detectionmentioning
confidence: 96%
See 2 more Smart Citations
“…[1,6] uses QR code in the transaction, which can be forged by attackers easily. In [5,[13][14][15], the other parties cannot detect double-spending.…”
Section: Double-spending Detectionmentioning
confidence: 96%
“…In this section, we compare our scheme with other related works [1,[3][4][5][6]9,[13][14][15]17,18,21,22] in terms of functions, as shown in Table 3. The functions include authentication, anonymity, limited credits, unlinkability, offline transactions, double-spending detection, NFC, and EMV-compatible.…”
Section: Comparison With Related Studiesmentioning
confidence: 98%
See 1 more Smart Citation
“…The concept of facial recognition technique through a vertical pose recovery fast semi-3D face [29] and fragile watermarking based on chaos theory [30] provided an impressive accuracy rate. Moreover, an extra security measure is achievable with the combination of this technique and other user authentication methods such as PIN.…”
Section: Physical Biometricsmentioning
confidence: 99%
“…Using triple-DES (3DES) in [73] provided more security in a cashless transaction than DES. The scheme proposed by [74] used a PIN, SIM card, and face recognition with a DES/3DES encryption algorithm to enforce the security between the mobile payment application and the virtual private ad hoc network. Alornyo et al [75] employed identity-based cryptography in securing mobile money wallets to resist insider attacks, and it consumed less computational cost in token generation.…”
mentioning
confidence: 99%