Author:
Arif Hassan Md,Shukur Zarina,Kamrul Hasan Mohammad
Reference40 articles.
1. Khattri V, Singh DK (2019) Implementation of an additional factor for secure authentication in online transactions. J Organ Comput Electron Commer 29(4):258–273
2. Harish M, Karthick R, Rajan RM, Vetriselvi V (2019) A new approach to securing online transactions—the smart wallet, vol 500. Springer, Singapore
3. Shaju S, Panchami V (2017) BISC authentication algorithm: an efficient new authentication algorithm using three factor authentication for mobile banking. In: Proceedings of 2016 online international conference on green engineering and technologies. IC-GET 2016, pp 1–5
4. Newcomb A (2019) Phishing scams can now hack two-factor authentication | fortune, 2019. Available: https://fortune.com/2019/06/04/phishing-scam-hack-two-factor-authentication-2fa/. Accessed: 21 Mar 2020
5. Ometov A, Bezzateev S, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y (2018) Multi-factor authentication: a survey. Cryptography 2(1):1
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献