An Authentication Model for Secure Electronic Transaction

被引:0
|
作者
Gupta, Himanshu [1 ]
Mondal, Subhash [2 ]
Giri, Biswajit [2 ]
Majumdar, Rana [2 ]
Ghosh, Neha Sana [2 ]
Mishra, Ved P. [3 ]
机构
[1] Amity Univ, AIIT, Noida, India
[2] Meghnad Saha Inst Technol, Kolkata, India
[3] Amity Univ Dubai, Dubai, U Arab Emirates
关键词
One Time password (OTP); Password; User; Security; Digits;
D O I
10.1109/iccike47802.2019.9004334
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Secure Electronic Transactions most of them use static key word. They follow different approach to protect the transaction using technologies like 3D Secure, VeriSign, OTP (One-time password) and Session Key word. Every method has their positives and negatives. The proposed idea is to enhance the level of security for One Time Password by making it a two-way process and involving the user and the code sent two combine both and Authenticate the process. It develops much more security for the user.
引用
收藏
页码:283 / 286
页数:4
相关论文
共 50 条
  • [1] Secure Transaction Authentication Protocol
    Pourghomi, Pardis
    Saeed, Muhammad Qasim
    Abi-Char, Pierre E.
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 261 - 273
  • [2] Model of Chinese debit card secure electronic transaction payment
    [J]. Liang, J., 2001, Xi'an Jiaotong University (35):
  • [3] Anonymous and secure electronic transaction protocol
    Brlek, S
    Hamadou, S
    Mullins, J
    [J]. ANNALS OF TELECOMMUNICATIONS, 2005, 60 (5-6) : 530 - 557
  • [4] A secure authentication scheme for a public terminal before a transaction
    Chen, Chin-Ling
    Chen, Yu-Yi
    Jan, Jinn-Ke
    [J]. NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2007, 4658 : 118 - +
  • [5] QR-TAN: Secure Mobile Transaction Authentication
    Starnberger, Guenther
    Froihofer, Lorenz
    Goeschka, Karl M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 578 - 583
  • [6] Chinese financial IC card secure electronic transaction protocol and model
    Liang, Jin
    Liang, Feng
    Gao, Zhenhua
    Li, Qi
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (10): : 1034 - 1037
  • [7] Applying accountability and atomicity to Secure Electronic Transaction
    Meng, B
    Xiong, QX
    Tan, XM
    [J]. DCABES 2002, PROCEEDING, 2002, : 276 - 279
  • [8] Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication
    Gualdoni, Joseph
    Kurtz, Andrew
    Myzyri, Ilva
    Wheeler, Megan
    Rizvi, Syed
    [J]. COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS, 2017, 114 : 93 - 99
  • [9] A SIM-based electronic transaction authentication system
    Ashraf, Manzur
    Aziz, Syed Mahfuzul
    Kabir, M. Lutful
    Dey, Biswajit K.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (04): : 253 - 260
  • [10] Electronic Transaction Authentication-A survey on Multimodal Biometrics
    Shunmugam, S.
    Selvakumar, R. K.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1310 - 1313