2015
DOI: 10.14257/astl.2015.109.07
|View full text |Cite
|
Sign up to set email alerts
|

Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices

Abstract: As increasing services with mobile devices, authentication technology by mobile devices has diversified. Nowadays to cope with security threat of e-commerce high rick transactions need multi-factor authentication technology conjoined in one or more factors. This paper proposes 2-factor authentication technology for security enhancement in electrical micro-payment system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Biometric, a common authentication scheme, was introduced as a replacement to the password that ensures that a legitimate person is logging. However, it can be compromised as the famous case of Apple Hack in 48 h in a security conference in Germany [47]. Two-factor authentication was introduced where the combination of password and biometric was preferred to be used as it provide chances to have better security.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Biometric, a common authentication scheme, was introduced as a replacement to the password that ensures that a legitimate person is logging. However, it can be compromised as the famous case of Apple Hack in 48 h in a security conference in Germany [47]. Two-factor authentication was introduced where the combination of password and biometric was preferred to be used as it provide chances to have better security.…”
Section: Introductionmentioning
confidence: 99%
“…Each scheme has its pros and cons making it challenging to adapt in every possible scenario. This results in a multiple-level authentication scheme based on the nature of the resource [47][48][49][50]. The following section presents the common authentication schemes and how they are used.…”
Section: Introductionmentioning
confidence: 99%
“…Afterwards, the entire payment process is simply completed with just a touch of a button. In addition to in-vehicle payments, wearable payment systems [3,4] have innovatively integrated payment methods into wearable devices such as smartwatches, jewelry, wristbands, fitness bands, and other adaptable wearables.…”
Section: Introductionmentioning
confidence: 99%