2016 Eighth International Conference on Advanced Computing (ICoAC) 2017
DOI: 10.1109/icoac.2017.7951750
|View full text |Cite
|
Sign up to set email alerts
|

GeoMoB — A geo location based browser for secured mobile banking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…Shoulder surfing attack: Attackers take advantage of crowded places to obtain mobile money agents' and users' PINs by looking over their shoulders while performing transactions. To resist this attack, [79][80][81]85,86,89,90,105] emphasised the use of sightless multifactor authentication. MITM attack: In this attack, the adversary sits between the mobile money user and MMSP and makes them believe that they are communicating directly with each other, when in fact the attacker controls the entire conversation.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Shoulder surfing attack: Attackers take advantage of crowded places to obtain mobile money agents' and users' PINs by looking over their shoulders while performing transactions. To resist this attack, [79][80][81]85,86,89,90,105] emphasised the use of sightless multifactor authentication. MITM attack: In this attack, the adversary sits between the mobile money user and MMSP and makes them believe that they are communicating directly with each other, when in fact the attacker controls the entire conversation.…”
Section: Resultsmentioning
confidence: 99%
“…MITM attack: In this attack, the adversary sits between the mobile money user and MMSP and makes them believe that they are communicating directly with each other, when in fact the attacker controls the entire conversation. There are different authentication protocols [56,[66][67][68][69][70][71]73,74,76,79,85,86,90,102,103] that are resilient against MITM attacks. To deal with this attack, [66,69] proposed the use of ECC.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations