2022
DOI: 10.12928/telkomnika.v20i6.22157
|View full text |Cite
|
Sign up to set email alerts
|

Design and develop authentication in electronic payment systems based on IoT and biometric

Abstract: Biometrics is a highly reliable technology where it has become possible to use the characteristics of a person or user (biometrics) along with traditional passwords, and we can even say that it has become an indispensable complement in modern authentication systems today, especially with regard to bank accounts, banks, financial technology (FinTech) internet of things (IoT) devices and all a process related to money and privacy, and biometric methods are multiple and increasing day by day, the most famous of w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
0
0
Order By: Relevance
“…Technology Adoption. The reason behind this is to keep it broad so as to let the SME owners and Top RFID (Alomari, 2022;Bruno-Valdivia et al, 2022;Konecka & Maryniak, 2020;Morenza-Cinos et al, 2019) E-Business/E-Commerce (Battisti & Brem, 2021;Bhatti et al, 2022;Krishna & Arora, 2022;Li & Ai, 2021;Mkansi, 2022) CRM (Chatterjee et al, 2022;Giovannetti et al, 2022;Hendler et al, 2022;Perez-Vega et al, 2022;Yadav, 2022) E-Payment (Hasbolah et al, 2023;Malaquias & Malaquias, 2022;Rahadi et al, 2022;Talib & Salman, 2022;Tripković & Simić, 2023) Loyalty Card (Abdul et al, 2021;Fearne et al, 2022;Jamshidi & Kuanova, 2022;Lee, 2021;Mitchell, 2021;Ortt & Schoormans, 2004;Wait, 2022) Inventory Management System (Alshamaila et al, 2013;Cordery et al, 2011;S. Jain & Gandhi, 2021;Jayaram, 2017;Mao, 2021;Sillah, 2015) SECOND SCHOOL OF THOUGHT…”
Section: Literature Reviewmentioning
confidence: 99%
“…Technology Adoption. The reason behind this is to keep it broad so as to let the SME owners and Top RFID (Alomari, 2022;Bruno-Valdivia et al, 2022;Konecka & Maryniak, 2020;Morenza-Cinos et al, 2019) E-Business/E-Commerce (Battisti & Brem, 2021;Bhatti et al, 2022;Krishna & Arora, 2022;Li & Ai, 2021;Mkansi, 2022) CRM (Chatterjee et al, 2022;Giovannetti et al, 2022;Hendler et al, 2022;Perez-Vega et al, 2022;Yadav, 2022) E-Payment (Hasbolah et al, 2023;Malaquias & Malaquias, 2022;Rahadi et al, 2022;Talib & Salman, 2022;Tripković & Simić, 2023) Loyalty Card (Abdul et al, 2021;Fearne et al, 2022;Jamshidi & Kuanova, 2022;Lee, 2021;Mitchell, 2021;Ortt & Schoormans, 2004;Wait, 2022) Inventory Management System (Alshamaila et al, 2013;Cordery et al, 2011;S. Jain & Gandhi, 2021;Jayaram, 2017;Mao, 2021;Sillah, 2015) SECOND SCHOOL OF THOUGHT…”
Section: Literature Reviewmentioning
confidence: 99%
“…Previous studies related to authentication include Talib and Salman [12] conveyed in his article proposing biometrics with finger print as user authentication. Sukarsa et al [13] in his article, he proposes using RADIUS and Mikrotik Routerboard to perform authentication, in addition to authentication, they use it for bandwidth management.…”
Section: Introductionmentioning
confidence: 99%