Secure Transaction on ATM Using OTP, FingerPrint and Reverse Pin Model
Abstract
Keywords
Full Text:
PDFReferences
M. Bond, O. Choudary, and S. Murdoch, “Chip and skim: Cloning EMV cards with the pre-play attack,” in Proc. IEEE S&P 2014, 2014, pp. 1–15.
D. Wang and P. Wang, “On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions,” Comput. Netw., vol. 73, pp. 41–57, 2014.
N. Gunson, D. Marshall, H. Morton, and M. Jack, “User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking,” Comput. Security, vol. 30, no. 4, pp. 208–220, 2011.
W.-H. Yang and S.-P. Shieh, “Password authentication schemes with smart cards,” Comput. Security, vol. 18, no. 8, pp. 727–733, 1999.
M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key exchange secure against dictionary attacks,” in Proc. 19th Int. Conf. Theory Appl. Cryptographic Tech., 2000, vol. 1807, pp.139–155
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.