2014
DOI: 10.5120/18930-0319
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution

Abstract: Wallet may be described as container application used for configuring, accessing and analysing data from underlying payment application(s). There are two dominant types of digital wallet applications, proximity wallet and remote wallet. In the payment industry, one often hears about authentication approach for proximity or remote wallets or the underlying payment applications separately, but there is no such approach, as per our knowledge, for combined wallet, the holder application. While Secure Element (SE) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…A conventional SFA approach can keep approved access, login, or get to the secret content by utilizing a single factorlike username and password. Now, this approach was hardened by utilizing at least two factors in the combination process [14]. According to National Institute of Standards and Technology (NIST), the digital identity of a user is defined as a series of functions of authentication, authorization, and accounting of a client in a specific context in a unique way (for example a payment service) [4].…”
Section: Identity Access Management Protocolsmentioning
confidence: 99%
“…A conventional SFA approach can keep approved access, login, or get to the secret content by utilizing a single factorlike username and password. Now, this approach was hardened by utilizing at least two factors in the combination process [14]. According to National Institute of Standards and Technology (NIST), the digital identity of a user is defined as a series of functions of authentication, authorization, and accounting of a client in a specific context in a unique way (for example a payment service) [4].…”
Section: Identity Access Management Protocolsmentioning
confidence: 99%