A Semiautomatic Authentication Method with Virtual Function for Internet Banking Environment

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 933

This Paper With 12 Page And PDF and WORD Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

IRANWEB02_004

تاریخ نمایه سازی: 9 مرداد 1395

Abstract:

Industry sectors such as banking have openly embraced E-commerce to improve their performance and gain strategic competitive advantages. Security and confidentiality of personal information and internet banking transactions is the most important concern for both businesses and consumers. There are a lot of malicious software and various kinds of attacks that steal financial account information. These attacks such as phishing, Trojans, malwares and etc have increased dramatically day to day, potentially resulting in a direct loss of hard currency to affected victims. So internet banking requires development and implementation sound and strong authentication methods that identify uniquely customers in a remote environment. This research assesses suggested protocols of authentication and methods in use at some internal and external banks, then propose an efficient token based method for authentication with help of virtual password concept. Then it simulated a client and server environment with ASP.NET programming language. Finally the result of proposed method is compared to Meli bank of Iran that used a hardware token.

Authors

Zeinab Zare Hosseini

Department of Engineering & Technology, Payame Noor University, Tehran

Ehsan Barkhordari

Department of Engineering & Technology, Payame Noor University, Tehran

Maryam Sadri

Department of Engineering & Technology, Payame Noor University, Tehran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • L.Lamport, Password authentication with insecure communic ation, Communic ations of ...
  • W.C. Ku, A hash-based strong-pas sword authentication scheme without using ...
  • A.K. Awasthi, S. Lal, A remote uSer authentication scheme using ...
  • W.C. Ku, S.T. Chang, Impersonation attack on _ dynamic ID-based ...
  • Jing Xu , Wen-Tao Zhn , Deng-Guo Feng , An ...
  • Da-Zhi Sun , Jin-Peng Huai , Ji-Zhou Sun , Jian-Xin ...
  • B. Vaidya, J. Hyuk Park, S. Yeo and J.J.P.C. Rodrigues, ...
  • Y. Huang, Z. Huang, H. Zhao and . Lai, A ...
  • L. Gong, J. Pan, B. Liua and S. Zhao, A ...
  • Ch.Y. Huang , Sh. Pin Maa and K.Ta. Chen, Using ...
  • نمایش کامل مراجع