2019 International Electronics Symposium (IES) 2019
DOI: 10.1109/elecsym.2019.8901575
|View full text |Cite
|
Sign up to set email alerts
|

Implementation QR Code Biometric Authentication for Online Payment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
26
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(34 citation statements)
references
References 4 publications
0
26
0
Order By: Relevance
“…Impersonation attacks: An attacker can assume the identity of a legitimate mobile money user or agent, access the financial details of a registered user, and perform fraudulent transactions. There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Impersonation attacks: An attacker can assume the identity of a legitimate mobile money user or agent, access the financial details of a registered user, and perform fraudulent transactions. There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics.…”
Section: Resultsmentioning
confidence: 99%
“…The idea of mutual authentication was proposed in [72,88]. On the other hand, [102,103] used random values like OTP. Replay attack: An attacker eavesdrops on network communication between the mobile money user and MMS, and intercepts the data packets that include the PIN, and then delays and resends it to the recipient.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations