Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Transaction authentication

Transaction authentication generally refers to the Internet-based security method of securely identifying a user through Two-factor authentication or… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Blockchain is a new distributed and decentralized technology, and gradually attracts worldwide attention, but it is vulnerable to… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
2018
2018
Secure and robust authentication of users and customers is critical, as an increasing number of services from banks, health and… Expand
  • figure 1
  • figure 2
  • table II
  • table III
  • figure 3
2015
2015
Bitcoin is designed to protect user anonymity or pseudo nymity in a financial transaction, and has been increasingly adopted by… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2010
2010
The threat of phishing or malicious software (malware)-based attacks is significant and growing, at the same time online banking… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Highly Cited
2009
Highly Cited
2009
The security of electronic transactions depends on the security of the user's terminal. An insecure terminal may allow an… Expand
  • figure 1
2009
2009
We present a design for a Wi-Fi user-authentication token that tunnels data through the SSID field, packet timing, and packet… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2008
2008
Current state-of-the art solutions for online banking authentication and identity management include methods for re… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2006
2006
  • K. Bignell
  • International Conference on Internet Surveillance…
  • 2006
  • Corpus ID: 16828673
This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks. Such… Expand
2003
2003
The Secret Key Transaction Authentication for DNS (TSIG) protocol provides transaction level authentication for DNS. TSIG is… Expand
Highly Cited
2000
Highly Cited
2000
This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to… Expand