2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) 2021
DOI: 10.1109/icecet52533.2021.9698724
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Factor Authentication Method for Online Banking Services in South Africa

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…IP addresses and geolocation can provide additional security by verifying the user's location [34], [68]. However, they can be masked or manipulated using proxy servers or virtual private networks (VPNs), reducing their effectiveness as standalone authentication methods [42], [69], [70]. CAPTCHA tests, widely used to distinguish between humans and automated bots, typically involve visual or auditory challenges requiring human interpretation [71].…”
Section: ) Other Authentication Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…IP addresses and geolocation can provide additional security by verifying the user's location [34], [68]. However, they can be masked or manipulated using proxy servers or virtual private networks (VPNs), reducing their effectiveness as standalone authentication methods [42], [69], [70]. CAPTCHA tests, widely used to distinguish between humans and automated bots, typically involve visual or auditory challenges requiring human interpretation [71].…”
Section: ) Other Authentication Methodsmentioning
confidence: 99%
“…2-Universal 2nd Factor, FIDO registration using a second-factor device such as a USB key. [42] The authors proposed an MFA method using username/password, user biometrics (fingerprint or facial recognition), and device identification (IP address, cookies, or digital certificate). [43] The authors in this study suggest the usage of mobile screen swipe and touch data for user authentication.…”
Section: Yearmentioning
confidence: 99%
“…(Akhtar & Haq, 2011). However, they can be masked or manipulated using proxy servers or virtual private networks (VPNs), reducing their effectiveness as standalone authentication methods (Moepi & Mathonsi, 2021). CAPTCHA tests contain visual or audio puzzles that require human interpretation to solve in order to distinguish between humans and automated bots.…”
Section: Introductionmentioning
confidence: 99%