Online Banking Authentication Using Mobile Phones

  title={Online Banking Authentication Using Mobile Phones},
  author={Xing Fang and Justin Zhan},
  journal={2010 5th International Conference on Future Information Technology},
Online banking authentication plays an important role in the field of online banking security. In past years, a number of methods, including password token, short message password, and USB token, have been developed for online banking authentication. In this paper, we introduce a new authentication protocol for online banking. Our approach enhances performance and robustness against various attacks by using mobile phones to store digital certificate for clients. We provide attack analysis to… CONTINUE READING


Publications citing this paper.
Showing 1-8 of 8 extracted citations

2FMA-NetBank: A proposed two factor and mutual authentication scheme for efficient and secure internet banking

2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE) • 2016
View 7 Excerpts
Highly Influenced

Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography

Wireless Personal Communications • 2016
View 9 Excerpts
Highly Influenced

S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card

2017 15th International Conference on Quality in Research (QiR) : International Symposium on Electrical and Computer Engineering • 2017

Performance analysis of encryption algorithms on mobile devices

2013 47th International Carnahan Conference on Security Technology (ICCST) • 2013
View 2 Excerpts

Online payment procedure involving mobile phone network infrastructure and devices

2011 International Conference on Multimedia Computing and Systems • 2011
View 1 Excerpt


Publications referenced by this paper.
Showing 1-9 of 9 references

Malicious Code Moves to Mobile Devices

IEEE Computer • 2000
View 6 Excerpts
Highly Influenced

ABA Survey: Consummers Prefer Online Banking

C. Kaplan
American Bankers Association, • 2009
View 1 Excerpt

EI-Hajj, Two Factor Authentication Using Mobile Phones

F. Aloul, S. Zahidi
IEEE/ACS International Conference on Computer Systems and Applications, • 2009
View 1 Excerpt

Rosenthol, Internet X.509 Public Key Infrastructure

S. Santesson, R. Housley, S. Bajaj
Certificate Image, • 2009
View 1 Excerpt

Bluetooth Worms: Models, Dynamics, and Defense Implications

2006 22nd Annual Computer Security Applications Conference (ACSAC'06) • 2006
View 1 Excerpt

Fourth-factor authentication: somebody you know

ACM Conference on Computer and Communications Security • 2006
View 1 Excerpt

Online Banking 2006: Surfing to the Bank

S. Fox, J. Beier
Pew Internet and American Life Project, • 2006
View 1 Excerpt

A Review of Current Issues , Privacy Rights Clearing House

S. Zahidi F. Aloul, W. EI-Hajj, +7 authors M. Yung
Somebody You Know , Proceedings of the 13 th ACM conference on Computer and communications security

Similar Papers

Loading similar papers…