Login / Signup
Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures.
Guma Ali
Mussa Ally Dida
Anael Elikana Sam
Published in:
Future Internet (2020)
Keyphrases
</>
countermeasures
authentication scheme
information security
smart card
information systems
public key
user authentication
financial institutions