2024
DOI: 10.33003/jobasr-2024-v2i1-29
|View full text |Cite
|
Sign up to set email alerts
|

RatHole: Authentication Algorithm for Controling Access to Mobile Phone File Management System

Muhammad Samaila Kabir,
Oyenike Mary Olanrewaju,
Abubakar Mukhtar

Abstract: Millions of Naira are being laundered by criminals through internet fraud, which deceives the victim with a false presentation, or hacking, which involves breaking information system security to steal financial information or data. Cybercrime, more specifically internet fraud, has become a common problem facing the world. In any case, this only occurred if the attacker was able to obtain the victim's account privileges (bank account, credit card information, or login credentials). This work presented an authen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 5 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?