2018 International Conference on Current Trends Towards Converging Technologies (ICCTCT) 2018
DOI: 10.1109/icctct.2018.8551172
|View full text |Cite
|
Sign up to set email alerts
|

Secure Three-Factor Remote user Authentication for E-Governance of Smart Cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The suggested approach has been verified using the popular Automated Validation of Internet Security Protocols and Applications tool. According to the security study [22], the system is resistant to numerous threats.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The suggested approach has been verified using the popular Automated Validation of Internet Security Protocols and Applications tool. According to the security study [22], the system is resistant to numerous threats.…”
Section: Countermeasuresmentioning
confidence: 99%
“…This is important for any governance transaction service provider because transactions as part of a governance process must be secure and easy to complete. Other references that are often used for security requirements in technology-based services include the following [21,22]:…”
mentioning
confidence: 99%
“…AccordingtotheAmericanheritagedictionary,fraudistermedasthedeceptionthatisintentionally accomplishedinordertoperformtheunlawfulgain.However,frauddetectionisusedtoidentify thesymptomsoffraud.Someoftheexamplesthatincludefrauddetectionstrategiesareaccounting fraud, credit card fraud, and insurance fraud. However, the information collected from Nigeria Inter-bank settlement system (NIBSS) showed that the fraudulent transactions are at peak levels inthebankingsector.Inrecentdecades,thefraudsarebeingevolvedandcommittedfromcasual fraudstersintotheorganizedcrimesuchthatthefraudringsutilizedsomesophisticatedtechniques tocontrolthecommitandaccountsoffraud.AccordingtotheresearchofJavelinin2007,nearly 6.8millionAmericansareoffendedthroughcardfraud.In2007,thefraudsintheexistingaccounts faced$3billionloss.Moreover,theNilsonreportspecifiesthecostoftheindustryas$4.84billion (Makki,et al,2019;Nilson,2007;John,et al,2016).In2007,Javelinstatesthetransactionloss amountas%30.6billion (Kim,&Monathan,2008;John,et al,2016).In2006,cardfraudmakes thetransactionlossof423millionaccordingtotheUKeconomy.Moreover,creditcardfraudloses accounttransactionsof$600milliongloballyeachyear (John,et al,2016).Fraudisthecriminalor wrongfuldeceptionthatisintendedtobringthepersonalorthefinancialgain (Zanetti,et al,2017;John,et al,2016;Randhawa,et al,2018).Theresearchworksinfraudreductionarecategorizedinto twotopics(i)frauddetectionand(ii)fraudprevention.Fraudpreventionistheproactiveapproach, wherethecauseoffraudisstopped (Gowthami,et al,2018;Cristin,et al,2019).However,fraud detectionishighlyrequiredwhenfraudulenttransactionsareacceptedbythefraudster (Ruan,et al, 2019;Randhawa,et al,2018).…”
Section: Introductionmentioning
confidence: 99%
“…Secure Communications. The data transmitted between systems or components, and more generally, communications in an IoT environment, should be protected from unauthorized disclosure or access [124][125][126][127]. 7.…”
mentioning
confidence: 99%