Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,489,287 papers from all fields of science
Search
Sign In
Create Free Account
Transaction authentication
Transaction authentication generally refers to the Internet-based security method of securely identifying a user through Two-factor authentication or…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
2 relations
Broader (1)
Computer access control
Transaction verification
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Unobtrusive Location-based Access Control Utilizing Existing IEEE 802.11 Infrastructure
Hosam Alamleh
,
J. Gourd
IEEE Microwave Theory and Techniques in Wireless…
2020
Corpus ID: 196196114
Mobile devices can sense several types of signals over the air using different radio frequency technologies (e.g., Wi-Fi…
Expand
Highly Cited
2018
Highly Cited
2018
An Anti-Quantum Transaction Authentication Approach in Blockchain
Wei Yin
,
Qiaoyan Wen
,
Wenmin Li
,
Hua Zhang
,
Zhengping Jin
IEEE Access
2018
Corpus ID: 3476266
Blockchain is a new distributed and decentralized technology, and gradually attracts worldwide attention, but it is vulnerable to…
Expand
2018
2018
DDoS Mitigation: Decentralized CDN Using Private Blockchain
Kyoungmin Kim
,
Youngin You
,
Mookyu Park
,
Kyungho Lee
Tenth International Conference on Ubiquitous and…
2018
Corpus ID: 52019673
Distributed Denial of Service (DDoS) attacks are intense and are targeted to major infrastructure, governments and military…
Expand
2018
2018
Biometric Transaction Authentication using Smartphones
Martin Stokkenes
,
Ramachandra Raghavendra
,
C. Busch
International Conference of the Biometrics…
2018
Corpus ID: 54436688
Secure and robust authentication of users and customers is critical, as an increasing number of services from banks, health and…
Expand
Review
2009
Review
2009
Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers
Nattakant Utakrit
2009
Corpus ID: 108975287
Initially, online scammers (phishers) used social engineering techniques to send emails to solicit personal information from…
Expand
Highly Cited
2009
Highly Cited
2009
QR-TAN: Secure Mobile Transaction Authentication
Guenther Starnberger
,
Lorenz Froihofer
,
K. M. Göschka
International Conference on Availability…
2009
Corpus ID: 14062161
The security of electronic transactions depends on the security of the user's terminal. An insecure terminal may allow an…
Expand
2009
2009
One-touch Financial Transaction Authentication
D. Bailey
,
John G. Brainard
,
S. Rohde
,
C. Paar
SECRYPT
2009
Corpus ID: 7380552
We present a design for a Wi-Fi user-authentication token that tunnels data through the SSID field, packet timing, and packet…
Expand
Highly Cited
2006
Highly Cited
2006
Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection
K. Bignell
International Conference on Internet Surveillance…
2006
Corpus ID: 16828673
This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks. Such…
Expand
2003
2003
Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG)
Stuart Kwan
,
P. Garg
,
James Gilroy
,
L. Esibov
,
J. Westhead
,
Randy Hall
RFC
2003
Corpus ID: 28020473
The Secret Key Transaction Authentication for DNS (TSIG) protocol provides transaction level authentication for DNS. TSIG is…
Expand
Highly Cited
2000
Highly Cited
2000
Secret Key Transaction Authentication for DNS (TSIG)
P. Vixie
,
Ó. Gudmundsson
,
D. Eastlake
,
B. Wellington
RFC
2000
Corpus ID: 40555567
This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE