2021
DOI: 10.1007/978-3-030-77392-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…Phishing According to Wilusz and Wójtowicz [35], phishing is a form of social engineering where attackers deceive victims into revealing sensitive information or installing malware. In the field of blockchain, the variants of asking for the private key, credentials, or cryptocurrency (as exchange or contribution) exist, according to Weber et al [129].…”
Section: Social Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…Phishing According to Wilusz and Wójtowicz [35], phishing is a form of social engineering where attackers deceive victims into revealing sensitive information or installing malware. In the field of blockchain, the variants of asking for the private key, credentials, or cryptocurrency (as exchange or contribution) exist, according to Weber et al [129].…”
Section: Social Engineeringmentioning
confidence: 99%
“…This could happen in blockchain use cases after phishing, but also following data breaches and other attacks. Wilusz and Wójtowicz [35] outline password guessing and biometric side-passing. Do et al [36] apply deep fakes against liveliness detection during biometric authentication.…”
Section: Social Engineeringmentioning
confidence: 99%
“…Instead, authentication process should rely on knowledge factor or biometric factor (Wilusz & W ojtowicz, 2021) constituting strong 2FA. Additionally, in order to protect the user against a distinct risk of key loss (key carrier that becomes lost, not supported anymore or out of order), BIP-39 mnemonic phrase solution is proposed to be applied.…”
Section: Security Analysismentioning
confidence: 99%
“…The authentication mechanism does not rely on another possession factor (key or certificate) since successful intrusion can affect both possession factors at once. Instead, authentication process should rely on knowledge factor or biometric factor (Wilusz & Wójtowicz, 2021) constituting strong 2FA. Additionally, in order to protect the user against a distinct risk of key loss (key carrier that becomes lost, not supported anymore or out of order), BIP‐39 mnemonic phrase solution is proposed to be applied.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation