2008 IEEE Congress on Services - Part I 2008
DOI: 10.1109/services-1.2008.32
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Securing E-Banking Authentication Process: Antiphishing Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Then the samples are converted into a mathematical model, then registered with a database of data analysis that can perform to application software (Hanaek, Malinka, & Schafer, 2008;Ortiz-Yepes, 2008) . In contrast to identity verification mechanisms, the biometric feature does not rely on user memory, so it distinguishes each user(San Martino & Perramon, 2008). After the data entry process is completed, customers communicate with a live examination thanks to the technology of biological characteristics, as this examination is used to identify and confirm the customer's identity (authentication) according to the recorded calibration forms stored inside the system, and when they are identical, the system is accessed (Briggs & Olivier, 2008) The fingerprint recognition techniques rely on the analysis of data extracted from the fingerprints, and it is very dense, because the density explains why fingerprints are the most reliable means of identification.…”
Section: Authentication *mentioning
confidence: 99%
“…Then the samples are converted into a mathematical model, then registered with a database of data analysis that can perform to application software (Hanaek, Malinka, & Schafer, 2008;Ortiz-Yepes, 2008) . In contrast to identity verification mechanisms, the biometric feature does not rely on user memory, so it distinguishes each user(San Martino & Perramon, 2008). After the data entry process is completed, customers communicate with a live examination thanks to the technology of biological characteristics, as this examination is used to identify and confirm the customer's identity (authentication) according to the recorded calibration forms stored inside the system, and when they are identical, the system is accessed (Briggs & Olivier, 2008) The fingerprint recognition techniques rely on the analysis of data extracted from the fingerprints, and it is very dense, because the density explains why fingerprints are the most reliable means of identification.…”
Section: Authentication *mentioning
confidence: 99%
“…The OTP was sent by the server to the customers during any transaction either to a mobile phone or email which is already registered to the concern bank account. If the OTP entered by the user matches, then only the bank allows the particular transaction [54]. The single password protocol (SPP) allows the customer to use the one-time password for their accounts.…”
Section: Existing Anti-phishing Approachesmentioning
confidence: 99%
“…The same authors propose a smartcard based identification protocol in [10]. Several security models aiming at phishing mitigation have been proposed [24] [25]. Basically, both solutions are limited to identifying users through the analysis of currently adopted processes and security models, being inefficient when applied to new internet banking systems.…”
Section: Related Workmentioning
confidence: 99%