Login / Signup

Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures.

Guma AliMussa Ally DidaAnael Elikana Sam
Published in: Future Internet (2020)
Keyphrases
  • countermeasures
  • authentication scheme
  • information security
  • smart card
  • information systems
  • public key
  • user authentication
  • financial institutions