2017
DOI: 10.1109/mce.2016.2640739
|View full text |Cite
|
Sign up to set email alerts
|

Pay-Cloak: A Biometric Back Cover for Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…These peer‐to‐peer data transfer techniques are designed to eliminate the constraints and drawbacks of other state‐of‐the‐art payment methods . One implementation of such a system, known as Pay‐Cloak, uses an NFC‐enabled smartphone back cover integrated with Bluetooth and a fingerprint sensor to add extra security layers over the transaction process to keep the data safe . Most of the existing work available in the literature is about securing the data through encryption or authentication of NFC tags and data editing.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…These peer‐to‐peer data transfer techniques are designed to eliminate the constraints and drawbacks of other state‐of‐the‐art payment methods . One implementation of such a system, known as Pay‐Cloak, uses an NFC‐enabled smartphone back cover integrated with Bluetooth and a fingerprint sensor to add extra security layers over the transaction process to keep the data safe . Most of the existing work available in the literature is about securing the data through encryption or authentication of NFC tags and data editing.…”
Section: Related Workmentioning
confidence: 99%
“…11 One implementation of such a system, known as Pay-Cloak, uses an NFC-enabled smartphone back cover integrated with Bluetooth and a fingerprint sensor to add extra security layers over the transaction process to keep the data safe. 5 Most of the existing work available in the literature is about securing the data through encryption or authentication of NFC tags and data editing. None of the existing techniques study register-level embodiment and possible theft prevention methods for the application developers and nontechnical users.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Usage of homographic encryption system is seen implemented most recently by Diaz et al [14] in order to secure the communication system of airport exclusively focusing on the baggage control system. Another recent work has been carried out by Majumder et al [15] have discussed a novel cloaking system to secure the electronic payment system, e.g., Samsung pay, google wallet, PayPal, etc. The paper has also discussed about existing research work towards payment system on NFC along with their verification techniques.…”
Section: Existing Security Approaches In Nfcmentioning
confidence: 99%