Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

作者: Guma Ali , Mussa Dida , Ally , Anael Sam , Elikana

DOI: 10.3390/FI12100160

关键词:

摘要: … associated with the current two-factor authentication (2FA) … and other leading scientific databases such as IEEE Xplore, … on authentication, mobile money system architecture, mobile …

参考文章(68)
Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi, On the (In)Security of Mobile Two-Factor Authentication Financial Cryptography and Data Security. pp. 365- 383 ,(2014) , 10.1007/978-3-662-45472-5_24
Badr Dine El Kessab, Seyed Reza Pakize, Shoreh Mokhteh, Shirzad Mirdrikvandi, A. Basigie, Rachid El Yachi, Sajad Bahrekazemi, Saeed Setayeshi, Reza Fotohi, Morteza Analoui, Pratik Gujar, Shahram Behzad, Mohammad Mosleh, Morteza AnalouiShahram moadab, Kamal Moro, Shahram Jamali, Mahdi Mosleh, Dr.P R Bajaj, Seyed masood khademi, L. Mselle, Belaid Bouikhalene, Abolfazl Gandomi, MohammadReza Yamaghani, Reza Ebrahimi Atani, Mohsen Fallah Rad, Mohammed Fakir, Amin Einipour, Hossein sadr, Securing Mobile Money Services in Tanzania: A Case of Vodacom M-Pesa International Journal Of Computer Science And Network Solutions. ,(2014)
Baraka Nyamtiga, Anael Sam, Loserian Laizer, Enhanced Security Model For Mobile Banking Systems In Tanzania International Journal of Technology Enhancements and Emerging Engineering Research. ,vol. 1, pp. 4- 20 ,(2013)
Hossain Shahriar, Tulin Klintic, Victor Clincy, Mobile Phishing Attacks and Mitigation Techniques Journal of Information Security. ,vol. 6, pp. 206- 212 ,(2015) , 10.4236/JIS.2015.63021
Haruhiko Fujii, Yukio Tsuruoka, SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response international conference for internet technology and secured transactions. pp. 283- 287 ,(2013) , 10.1109/ICITST.2013.6750207
Jin-Hyuk Jung, Ju Young Kim, Hyeong-Chan Lee, Jeong Hyun Yi, Repackaging Attack on Android Banking Applications and Its Countermeasures Wireless Personal Communications. ,vol. 73, pp. 1421- 1437 ,(2013) , 10.1007/S11277-013-1258-X
Yang Lu, Jiguo Li, Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. The Scientific World Journal. ,vol. 2014, pp. 295419- 295419 ,(2014) , 10.1155/2014/295419
Michael Paik, Stragglers of the herd get eaten: security concerns for GSM mobile banking applications workshop on mobile computing systems and applications. pp. 54- 59 ,(2010) , 10.1145/1734583.1734597
Jhe-Yi Hu, Chien-Cheng Sueng, Wei-Hsiang Liao, Chian C. Ho, Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking 2012 Computing, Communications and Applications Conference. pp. 111- 116 ,(2012) , 10.1109/COMCOMAP.2012.6154013
Imad H. Elhajj, Ali Chehab, Ayman Kayssi, Khodor Hamandi, Alaa Salman, Messaging Attacks on Android: Vulnerabilities and Intrusion Detection Mobile Information Systems. ,vol. 2015, pp. 1- 13 ,(2015) , 10.1155/2015/746930