Role of authentication factors in Fin-tech mobile transaction security.
Habib Ullah KhanMuhammad SohailShah NazirTariq HussainBabar ShahFarman AliPublished in: J. Big Data (2023)
Keyphrases
- factor authentication
- identity authentication
- mobile commerce
- security mechanisms
- mobile payment
- security requirements
- user authentication
- data encryption
- security analysis
- authentication mechanism
- identity management
- fuzzy vault
- encryption decryption
- integrity verification
- biometric data
- access control
- trusted third party
- authentication protocol
- virtual private network
- authentication systems
- mobile devices
- authentication scheme
- information security
- intrusion detection
- network security
- network access
- elliptic curve cryptography
- data security
- security services
- high security
- public key cryptography
- electronic payment
- security issues
- role based access control
- database
- electronic commerce
- biometric template
- security policies
- public key infrastructure
- transaction management
- trust negotiation
- transaction processing
- mutual authentication
- credit card
- resource constrained
- mobile applications
- key agreement
- encryption scheme
- transaction model
- security level
- key distribution
- trusted platform module
- ad hoc networking