+

Thawre et al., 2020 - Google Patents

Use cases of authentication protocols in the context of digital payment system

Thawre et al., 2020

Document ID
16354829405273122137
Author
Thawre G
Bahekar N
Chandavarkar B
Publication year
Publication venue
2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

External Links

Snippet

In the digital payment system, the transactions and their data about clients are very sensitive, so the security and privacy of personal information of the client is a big concern. The confirmation towards security necessities prevents the data from a stolen and unauthorized …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Ahmed et al. Security in next generation mobile payment systems: A comprehensive survey
Tiwari et al. A multi-factor security protocol for wireless payment-secure web authentication using mobile devices
US10742419B2 (en) Validation cryptogram for transaction
Ahamad et al. A survey on crypto currencies
JP2021529397A (en) Systems and methods for blockchain address and owner verification
US20080235513A1 (en) Three Party Authentication
US20060123465A1 (en) Method and system of authentication on an open network
CN107710258A (en) System and method for personal identification and checking
CN114270780A (en) Gateway agnostic tokenization
Kiran et al. Reliable OSPM schema for secure transaction using mobile agent in micropayment system
US20240414003A1 (en) Checkout with mac
Vijayan et al. Digital payments: blockchain based security concerns and future
Thawre et al. Use cases of authentication protocols in the context of digital payment system
Layeghian Javan et al. An anonymous mobile payment protocol based on SWPP
KR101941625B1 (en) System for SNS finetech using authentication based selecting and method for operating the same
Sung et al. Mobile Payment Based on Transaction Certificate Using Cloud Self‐Proxy Server
US11985254B2 (en) Threshold multi-party computation with must-have member
Kiran et al. Implication of secure micropayment system using process oriented structural design by hash chaining in mobile network
Dhamija et al. A secure and reliable architecture for user authentication through OTP in mobile payment system
Omodunbi et al. Integrating Asymmetric Cryptographic Digital Wallet for Online Services in Nigeria
Saranya et al. Block chain-based trusted smart contract for secure mobile user payment gateway in e-health systems
Ashiqul Islam et al. An online E-Cash scheme with digital signature authentication cryptosystem
Vahidalizadehdizaj et al. Mobile payment protocol 3D (MPP 3D) by using cloud messaging
Konara et al. Decentralized Identity Management on Ripple: A Conceptual Framework for High-Speed, Low-Cost Identity Transactions in Attestation-Based Attribute-Based Identity
Akinyede et al. A security model for preventing e-commerce related crimes
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载