SECURITY USER AUTHENTICATION PAYMENT SYSTEM
نویسندگان
چکیده
منابع مشابه
Security System Based on User Authentication Using Keystroke Dynamics
−Keystroke Dynamics is behavioural biometric used to measure the typing rhythm of the user when an individual types on the keyboard. It is assumed as a robust behavioural biometric. The functionality of this biometric is to measure the dwell time and flight time for changing keyboard actions. The paper focuses on enhancement of security using individual’s typing actions to distinguish between a...
متن کاملTransit Payment System Security WP
The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is ...
متن کاملModified USB Security Token for User Authentication
Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...
متن کاملA Security Protocol for Multi-User Authentication
Abstract: In this note we propose an encryption communication protocol which also provides database security. For the encryption of the data communication we use a transformation similar to the Cubic Public-key transformation [1]. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also inc...
متن کاملBasic Security of the ecashTM Payment System
ecash is a payment system designed and implemented for making purchases over open networks such as the Internet. In this paper we review some of the main cryptographic techniques used throughout the ecash system. We will focus on security aspects as well as some performance related issues. The central notion of an electronic coin is treated in detail, and the basic protocols manipulating coins ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Современные наукоемкие технологии (Modern High Technologies)
سال: 2019
ISSN: 1812-7320
DOI: 10.17513/snt.37593