Skip to search formSkip to main contentSkip to account menu

Transaction authentication

Transaction authentication generally refers to the Internet-based security method of securely identifying a user through Two-factor authentication or… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Mobile devices can sense several types of signals over the air using different radio frequency technologies (e.g., Wi-Fi… 
Highly Cited
2018
Highly Cited
2018
Blockchain is a new distributed and decentralized technology, and gradually attracts worldwide attention, but it is vulnerable to… 
2018
2018
Distributed Denial of Service (DDoS) attacks are intense and are targeted to major infrastructure, governments and military… 
2018
2018
Secure and robust authentication of users and customers is critical, as an increasing number of services from banks, health and… 
Review
2009
Review
2009
Initially, online scammers (phishers) used social engineering techniques to send emails to solicit personal information from… 
Highly Cited
2009
Highly Cited
2009
The security of electronic transactions depends on the security of the user's terminal. An insecure terminal may allow an… 
2009
2009
We present a design for a Wi-Fi user-authentication token that tunnels data through the SSID field, packet timing, and packet… 
Highly Cited
2006
Highly Cited
2006
  • K. Bignell
  • International Conference on Internet Surveillance…
  • 2006
  • Corpus ID: 16828673
This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks. Such… 
2003
2003
The Secret Key Transaction Authentication for DNS (TSIG) protocol provides transaction level authentication for DNS. TSIG is… 
Highly Cited
2000
Highly Cited
2000
This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to…