Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices
|
|
|
- Dayna Welch
- 10 years ago
- Views:
Transcription
1 , pp Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices Byung-Rae Cha 1, Sang-Hun Lee 2, Soo-Bong Park 3, Gun-Ki Lee 4 Yoo-Kang Ji 5 1 School of Information & Communications, GIST. 123, Cheomdan Gwagi-ro, Buk-Gu, Gwangju, , Republic of KOREA [email protected] 2 Dept. of Electrical & Electronics Eng. DongKang College, 50, Dongmundaero, Buk-Gu, Gwangju, , Republic of KOREA [email protected] 3 Dept. Of Information & Communication Eng. DongShin Univ. 185, Geonjae-ro, Naju City, Joennam , Republic of KOREA, [email protected] 4 Dept. of Electronic Eng. Gyeongsang National University 900 Gajwa-Dong Jinju Gyeongnam , Republic of KOREA, [email protected] 5 School of Information & Communications, GIST. 123, Cheomdan Gwagi-ro, Buk-Gu, Gwangju, , Republic of KOREA Corresponding Author : [email protected] Abstract. As increasing services with mobile devices, authentication technology by mobile devices has diversified. Nowadays to cope with security threat of e-commerce high rick transactions need multi-factor authentication technology conjoined in one or more factors. This paper proposes 2-factor authentication technology for security enhancement in electrical micro-payment system. Keywords: Micro-payment, NFC, Mobile, Wearable Device, 2 Factor Authentication. 1 Introduction Development in smart phone and mobile communication brought new payment method. Recently newly rising are payment methods like mobile banking combined ICT technology, cash-coupon used in SNS, pin-tech and so on. Behind this development various and intellectual hacking attacks for wrong purposes have occured. The more complicated hacking tech becomes, the more difficult to react with simple authentication. World widely e-banking attacks for monetary gain are on a rapid rising trend as follows; in third quater of 2013 malwares against e-commerce increased over a couple hundred thousand and grew by 38% over previous quater. ISSN: ASTL Copyright 2015 SERSC
2 In order to cope with complex security threat nowadays security card, OTP operator, mobile phone SMS authentication as well as ID/PW are used and China, Singapore, Europe adopted signiture deal technology actively using in high-risk transaction like large amount transfer. Furthermore Singapore, Sweden, Norway, etc. are continuing to do research on integrated authentication service for managing complex user acceptance ways integrately and dealing with security threat efficiently. Especially Guidelines for e-banking authentication of the Federal Financial Institutions Examination Council (FFIEC) and Guidelines for risk management of e- commerce of Monetary Authority of Singapore (MAS) recommend multi-factor authentication in high risk transactions. Recently domestically many authentication ways are adopted like additional authentication sending authentication code to the mobile phone in large amount transfer and simple authentication only by fingerprint. However in these various authentications the necessity of the standard for security and usability would be speculated by service providers and users. This paper proposes 2-factor authentication technology by the user certification and smart watch on the purpose of security enhancement for electrical micropayments. 2 Related Researches Authentication can be classified into three major base authentication technology which are possession, knowledge and property and other authentication factors. Possession-based authentication is confirming transaction orders by text and numbers input using user devices like OTP, Smart card, Hardware security module(hsm) and so on. Secondly knowledge-based is user memorizing ID/PW, PIN, etc, which is widely used as easy online authentication method. Thirdly property-based is using bio-data like fingerprint, voice, iris, etc. Despite it s high level of security, because of privacy problem it s mainly used only as access control. The other factors are electrical autograph, location information and so on. The location information is the way offering services using GPS of smart phone only by the valid user location. The following table1 shows the classification of authentication factors. Table 1. Classification of authentication factors Two Factor Authentication Three Factor Authentica- Combination Knowledge based + Property based Knowledge based + Features based Property based + Features based Knowledge based + Property based + Features based Example Password + OTP Password + fingerprint OTP+ fingerprint Password + OTP + fingerprint Copyright 2015 SERSC 29
3 tion Recently as mobile devices develop, high userbility authentication technologys using them are emerging. Especially they include USIM, IC card, OTP, authentication certificates. Also two channel authentication using additional authentication through registered cell phone in case of electrical fund transfer is the authentication by mobile devices. As in the Fig.1 after the USER transfers knowledge-based or property-based authentication information to MOBILE DEVICE, each element autonomously or using security element creates new authentication information with additional possession based characteristic and authorizes user. Fig. 1. Concept diagram of multi-factor authentication technique based on Mobile device In order to do this multi factor authentication is required to meet the security requirements for object authentication framework in ITU-T X Multi factor mechanism should offer two or more different shaped authentication factor for user authentication. Multi factor authentication mechanism using mobile device (TTAK.KO ) the standard made in 2013 categorizes into four and describes requred service model and protocol for the security of multi factor authentication technology by mobile device. As the international standard ITU-T X.1158 in 2014 is set and includes various multi factor authentication mechanism used in not only domestic but also foreign e- commerce. This standard presents detailed security requirements to a minimum necessary for the case of multi-channel and safe mobile device. Thus it can be used as the guideline by the service provider who want to introduce real services. 3 Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices NFC-based electrical micro-payment system for revitalizating traditional markets corrects the shortcomings of POS in traditional markets and expands business area for retailers from cash to mobile transaction. 30 Copyright 2015 SERSC
4 The figure 2 shows NFC based micro-payment process. Previously developed systems have problems like missing mobile devices. To solve them 2-factor authentication is proposed as shown in the fig.4. Fig. 2. NFC-based Micro-payment process by knowledge-based authentication For the 2-factor authentication using the smart watch as wearable device which has secure elements the electrical micro-payment is made through the authentication of user and smart phone together. As shown in the fig.4 NFC-based micro-payment system can strengthen the security by double factor authentication. Fig. 3. Mobile & wearable device-based 2 factor authentication technique Fig. 4. NFC-based Micro-payment process by 2 factor authentication Copyright 2015 SERSC 31
5 The new business model establishment of existing NFC-based electrical micropayment system by 2-factor authentication in the fig.4 and the designs of various payment types according to the absent of multi factor elements are needed. 4 Conclusions As increasing the services using mobile devices, various authentication technologys are introduced (developed) and nowadays for coping with security threat of high risk transactions multi factor authentication technology combined one or more factors is recommended. This paper for the purpose of security enhancement of micro-payment systems proposes 2-factor authentication technology with knowledge-based authentication by user and possession-based authentication by smart watch. References 1. Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. Vol.147, pp (1981) 2. Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis.: Gaithashing: A two-factor authentication scheme based on gait features., Journal of Computer & Security, vol.52, pp17-32 (2015) 3. Apple touch ID, 4. Argyropoulos S, Tzovaras D, Ioannidis D, Strintzis M. A.: Channel coding approach for human authentication from gait sequences, IEEE Trans Information Forensics Security Sept. (2009) 5. Yoo-Kang Ji, Byung-Rae Cha,: Prototype design of NFC-based electronic coupon ecosystem with object memory model, Contemporary Engineering Sciences, vol. 7, No. 22, , (2014) 6. Chun-Ta Li, Chi-Yao Weng and Chun-I Fan.: Two-Factor user Authentication in Multi- Server Networks International Journal of Security and Its Applications, Vol.6, No.2, pp , (2012) 7. Sultan Ullah, Zheng Xuefeng and Zhou Feng.: TCLOUD:A Multi-Factor Access Control Framework for Cloud Computing, International Journal of Security and Its Applications, Vol.7, No.2, pp.15-26, (2013) 8. Soonduck Yoo, Seung-jung Shin and dae-hyun Ryu.: An Innovative Two Factor Authentication Method : The QRLogin System International Journal of Security and Its Applications, Vol. 7, No.3 pp , (2013) 32 Copyright 2015 SERSC
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
Prototype Design of NFC-Based Electronic. Coupon Ecosystem with Object Memory Model
Contemporary Engineering Sciences, Vol. 7, 2014, no. 22, 1105-1112 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49138 Prototype Design of NFC-Based Electronic Coupon Ecosystem with
A Study on User Access Control Method using Multi-Factor Authentication for EDMS
, pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Towards Securing E-Banking by an Integrated Service Model Utilizing Mobile Confirmation
Research Inventy: International Journal of Engineering And Science Vol.4, Issue 9 (Sept 2014), PP 26-30 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Towards Securing E-Banking by an
The Development of an Intellectual Tracking App System based on IoT and RTLS
, pp.9-13 http://dx.doi.org/10.14257/astl.2015.85.03 The Development of an Intellectual Tracking App System based on IoT and RTLS Hak-Jun Lee 1, Ju-Su Kim 1, Umarov Jamshid 1, Man-Kyo Han 2, Ryum-Duck
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
A Method of Risk Assessment for Multi-Factor Authentication
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Integration of Hadoop Cluster Prototype and Analysis Software for SMB
Vol.58 (Clound and Super Computing 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.58.01 Integration of Hadoop Cluster Prototype and Analysis Software for SMB Byung-Rae Cha 1, Yoo-Kang Ji 2, Jong-Won
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
, pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer
The Bayesian Network Methodology for Industrial Control System with Digital Technology
, pp.157-161 http://dx.doi.org/10.14257/astl.2013.42.37 The Bayesian Network Methodology for Industrial Control System with Digital Technology Jinsoo Shin 1, Hanseong Son 2, Soongohn Kim 2, and Gyunyoung
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver
, pp.161-165 http://dx.doi.org/10.14257/astl.205.98.41 Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver Jeong MyeongSu 1, Moon ChangSoo 1, Gwon DaeHyeok 1 and Cho
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX
Mobile Banking Secure Banking on the Go Matt Hillary, Director of Information Security, MX Mobile Banking Channels SMS / Texting Mobile Banking Channels Mobile Web Browser Mobile Banking Channels Mobile
Customized Efficient Collection of Big Data for Advertising Services
, pp.36-41 http://dx.doi.org/10.14257/astl.2015.94.09 Customized Efficient Collection of Big Data for Advertising Services Jun-Soo Yun 1, Jin-Tae Park 1, Hyun-Seo Hwang 1, Il-Young Moon 1 1 1600 Chungjeol-ro,
Accredited Certification Services on Cloud Environment. SungEun Moon KOSCOM [email protected]. 17 September, 2012
Accredited Certification Services on Cloud Environment SungEun Moon KOSCOM [email protected] 17 September, 2012 Index Existing Accredited Certificate Use and Enhanced Security Measure Accredited Certificate
Security Measures of Personal Information of Smart Home PC
, pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Design of Mobile Application Service of e-business Card and NFC
, pp.403-414 http://dx.doi.org/10.14257/ijmue.2014.9.3.39 Design of Mobile Application Service of e-business Card and NFC Jae Hong Youn 1, Byung-rae Cha 2 and Yoo-Kang Ji 3 1 Digital contents cooperative
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
Review of the Techniques for User Management System
, pp.87-91 http://dx.doi.org/10.14257/astl.2014.46.20 Review of the Techniques for User Management System Jaegeol Yim *, Gyeyoung Lee *, Kyungsoo Ham * *Dongguk University at Gyeongju Korea, {yim, lky,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Security Assessment through Google Tools -Focusing on the Korea University Website
, pp.9-13 http://dx.doi.org/10.14257/astl.2015.93.03 Security Assessment through Google Tools -Focusing on the Korea University Website Mi Young Bae 1,1, Hankyu Lim 1, 1 Department of Multimedia Engineering,
Two-Factor Authentication: Tailor-Made for SMS
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
A Digital Door Lock System for the Internet of Things with Improved Security and Usability
, pp.33-38 http://dx.doi.org/10.14257/astl.2015.109.08 A Digital Door Lock System for the Internet of Things with Improved Security and Usability Ohsung Doh 1, Ilkyu Ha 1 1 Kyungil University, Gyeongsan,
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology
Vol.63 (NT 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.63.01 An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology Hojae Lee 1, Junkwon Jung 1, Taeyoung
UPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
Implementation of the E-Catalog Mobile E-commerce Platform using 3D GIS Information
Implementation of the E-Catalog Mobile E-commerce Platform using 3D GIS Information ChangSoo Moon, HaengSuk Lee, HyunKI Ryu, SeIl Oh R&D Team GIVET(GyeongBuk Research Institute of Vehicle Embedded Technology)
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols Anurag Anand Duvey 1, Dinesh Goyal 2, Dr. Naveen Hemrajani 3 1, 2, 3 Suresh Gyan Vihar University, Jaipur
A Research on Security Awareness and Countermeasures for the Single Server
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
SNS Information Credibility, Medical Tourism Website Credibility and Destination Image
, pp.141-145 http://dx.doi.org/10.14257/astl.2015.114.27 SNS Information Credibility, Medical Tourism Website Credibility and Destination Image Min-sook Kim Dept. of Economic and Commerce, Keimyung University
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
Big Data Collection Study for Providing Efficient Information
, pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and
Success factors for the implementation of ERP to the Agricultural Products Processing Center
, pp.61-66 http://dx.doi.org/10.14257/astl.2015.95.12 Success factors for the implementation of ERP to the Agricultural Products Processing Center Jung Rock Do 1, Jin Hyeung Kim 2, Young Chan Choe 3 1
Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a
Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach
, pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
Authentication Methods for USIM-based Mobile Banking Service
Authentication Methods for USIM-based Mobile Banking Service Jonghyun Baek 1, Young-Jun Kim 1, Yoojae Won 1, HeungYoul Youm 2 Korea Information Security Agency, Seoul, Korea 1 Soon Chun Hyang University,
Experiences with Studying Usability of Two-Factor Authentication Technologies. Emiliano De Cristofaro https://emilianodc.com
Experiences with Studying Usability of Two-Factor Authentication Technologies Emiliano De Cristofaro https://emilianodc.com Two Factor (2FA) Authentication Authentication Token password Fingerprint Phone
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan
, pp.61-66 http://dx.doi.org/10.14257/ijmue.2015.10.12.07 A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan Yun-Seong Ko 1, Il-Kyeun Ra 2 and Chang-Soo Kim 1* 1 Department
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
What the Future of Online Banking Authentication Could Be
Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December
A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
, pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
