2016 6th International Conference on System Engineering and Technology (ICSET) 2016
DOI: 10.1109/icsengt.2016.7849649
|View full text |Cite
|
Sign up to set email alerts
|

Mutual authentication in securing mobile payment system using encrypted QR code based on Public Key Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(27 citation statements)
references
References 1 publication
0
27
0
Order By: Relevance
“…Impersonation attacks: An attacker can assume the identity of a legitimate mobile money user or agent, access the financial details of a registered user, and perform fraudulent transactions. There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Impersonation attacks: An attacker can assume the identity of a legitimate mobile money user or agent, access the financial details of a registered user, and perform fraudulent transactions. There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics.…”
Section: Resultsmentioning
confidence: 99%
“…Singh and Jasmine [87], Kisore and Sagi [67], Rodrigues, Chaudhari, and More [56], Alhothailya et al [77], and Salim, Sagheer, and Yaseen [70] adopted hashing functions. Purnomo, Gondokaryono, and Kim [72] proposed an asymmetric encryption function. The idea of mutual authentication was proposed in [72,88].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations