A Semiautomatic Authentication Method with Virtual Function for Internet Banking Environment

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 938

فایل این مقاله در 12 صفحه با فرمت PDF و WORD قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

IRANWEB02_004

تاریخ نمایه سازی: 9 مرداد 1395

چکیده مقاله:

Industry sectors such as banking have openly embraced E-commerce to improve their performance and gain strategic competitive advantages. Security and confidentiality of personal information and internet banking transactions is the most important concern for both businesses and consumers. There are a lot of malicious software and various kinds of attacks that steal financial account information. These attacks such as phishing, Trojans, malwares and etc have increased dramatically day to day, potentially resulting in a direct loss of hard currency to affected victims. So internet banking requires development and implementation sound and strong authentication methods that identify uniquely customers in a remote environment. This research assesses suggested protocols of authentication and methods in use at some internal and external banks, then propose an efficient token based method for authentication with help of virtual password concept. Then it simulated a client and server environment with ASP.NET programming language. Finally the result of proposed method is compared to Meli bank of Iran that used a hardware token.

نویسندگان

Zeinab Zare Hosseini

Department of Engineering & Technology, Payame Noor University, Tehran

Ehsan Barkhordari

Department of Engineering & Technology, Payame Noor University, Tehran

Maryam Sadri

Department of Engineering & Technology, Payame Noor University, Tehran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • L.Lamport, Password authentication with insecure communic ation, Communic ations of ...
  • W.C. Ku, A hash-based strong-pas sword authentication scheme without using ...
  • A.K. Awasthi, S. Lal, A remote uSer authentication scheme using ...
  • W.C. Ku, S.T. Chang, Impersonation attack on _ dynamic ID-based ...
  • Jing Xu , Wen-Tao Zhn , Deng-Guo Feng , An ...
  • Da-Zhi Sun , Jin-Peng Huai , Ji-Zhou Sun , Jian-Xin ...
  • B. Vaidya, J. Hyuk Park, S. Yeo and J.J.P.C. Rodrigues, ...
  • Y. Huang, Z. Huang, H. Zhao and . Lai, A ...
  • L. Gong, J. Pan, B. Liua and S. Zhao, A ...
  • Ch.Y. Huang , Sh. Pin Maa and K.Ta. Chen, Using ...
  • نمایش کامل مراجع