2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Syst 2017
DOI: 10.1109/eeeic.2017.7977654
|View full text |Cite
|
Sign up to set email alerts
|

Cam-Wallet: Fingerprint-based authentication in M-wallets using embedded cameras

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(24 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…Impersonation attacks: An attacker can assume the identity of a legitimate mobile money user or agent, access the financial details of a registered user, and perform fraudulent transactions. There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Impersonation attacks: An attacker can assume the identity of a legitimate mobile money user or agent, access the financial details of a registered user, and perform fraudulent transactions. There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics.…”
Section: Resultsmentioning
confidence: 99%
“…There are 14 authentication protocols [56,[66][67][68][69][70]72,77,81,87,88,102,103,105] to prevent impersonation attacks. The schemes in [81,105] employed fingerprint biometrics. Bojjagani and Sastry [66], Ray, Biswas, and Dasgupta [68], and Shilpa and Panchami [69] used elliptic curve cryptosystems.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The same method is used if the user wants to purchase his home PC by using specialized hardware connected with PC. A secure online shopping mechanism which uses a credit card and biometric information of buyer is presented in [9]. This mechanism uses a special storage device provided to the user from card issuer.…”
Section: Literature Reviewmentioning
confidence: 99%