2008
DOI: 10.4304/jnw.3.1.25-34
|View full text |Cite
|
Sign up to set email alerts
|

Fraudulent Internet Banking Payments Prevention using Dynamic Key

Abstract:

As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-service requirements are also opening up new opportunity to commit financial fraud. Internet banking fraud is one of the most serious electronic crimes (e-crimes) and mos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…This is because a secret key needs to be shared between engaging parties in a secure manner. A number of session key generation and distribution techniques have been proposed [5,[7][8][9][10][11][12][13]. Among the above techniques, Kungpisdan et al [8] introduced a session key generation technique that not only it is secure against key compromise attacks, but it can also operate purely offline.…”
Section: ) Session Key Generation and Distributionmentioning
confidence: 99%
“…This is because a secret key needs to be shared between engaging parties in a secure manner. A number of session key generation and distribution techniques have been proposed [5,[7][8][9][10][11][12][13]. Among the above techniques, Kungpisdan et al [8] introduced a session key generation technique that not only it is secure against key compromise attacks, but it can also operate purely offline.…”
Section: ) Session Key Generation and Distributionmentioning
confidence: 99%
“…Our protocol is based on symmetric key encryption, using a secure session key distribution to improve the protocol [13]. Many session key generation techniques have been suggested [14,15]. One technique was suggested by [13], which is not only secured key compromise attacks but can also operate purely offline.…”
Section: The Proposed Protocolmentioning
confidence: 99%
“…papers [29,[31][32][33][34][35]. Among all the mentioned approaches, [29] proposed a secure session key generation technique that prevents key compromise attacks.…”
Section: Intermediate Key Generationmentioning
confidence: 99%