Open Access
Issue |
E3S Web Conf.
Volume 491, 2024
International Conference on Environmental Development Using Computer Science (ICECS’24)
|
|
---|---|---|
Article Number | 04023 | |
Number of page(s) | 10 | |
Section | Engineering for Environment Development Applications | |
DOI | https://doi.org/10.1051/e3sconf/202449104023 | |
Published online | 21 February 2024 |
- Abiew, Nuku Atta Kordzo, Maxwell Dorgbefu Jnr, and Samuel Osei Banning. (2020). “Design and Implementation of Cost Effective Multi-Factor Authentication Framework for ATM Systems.” Asian Journal of Research in Computer Science 5 (3): 7–20. [CrossRef] [Google Scholar]
- Abiodun, Moses Kazeem, Joseph Bamidele Awotunde, Abidemi Emmanuel Adeniyi, David Ademuagun, and Dayo Reuben Aremu. (2022). “Securing Digital Transaction Using a Three-Level Authentication System.” In Computational Science and Its Applications – ICCSA 2022 Workshops, 135–48. Springer International Publishing. [Google Scholar]
- Agrawal, S. S., P. Oza, M. Biswas, and N. Choksi. (2021). “Enhanced Secure ATM Authentication Using NFC Technology and Iris Verification.” Scalable Computing: Practice. https://scpe.org/index.php/scpe/article/view/1920. [Google Scholar]
- Ahamed, Jubayer, Maliha Maisha, Zeba Labiba, Md Ariful Islam, and Dip Nandi.(2022). “A Review Report on the Fingerprint-Based Biometric System in ATM Banking.” In Proceedings of the 2nd International Conference on Computing Advancements, 522–29. ICCA ’22. New York, NY, USA: Association for Computing Machinery. [Google Scholar]
- Anjaneyulu, G. S. G. N., and V. Jalaja. (2021). “Novel Authentication Process of the Smart Cards Using Face and Fingerprint Recognition.” In Advances in Automation, Signal Processing, Instrumentation, and Control, 2547–56. Springer Nature Singapore. [Google Scholar]
- Anveshini, D., V. Revathi, A. Eswari, P. Mounika, K. Meghana, and D. Aparna. (2022). “Pattern Recognition Based Fingerprint Authentication for ATM System.” In 2022 International Conference on Electronics and Renewable Systems (ICEARS), 1708–13. ieeexplore.ieee.org. [Google Scholar]
- Chowhan, Rahul Singh, and Rohit Tanwar. (2019). “Password-Less Authentication: Methods for User Verification and Identification to Login Securely Over Remote Sites.” In Machine Learning and Cognitive Science Applications in Cyber Security, 190–212. IGI Global. [Google Scholar]
- Dewangan, Narendra K., and Preeti Chandrakar. (2022). “Patient-Centric Token-Based Healthcare Blockchain Implementation Using Secure Internet of Medical Things.” IEEE Transactions on Computational Social Systems, 1–11. [Google Scholar]
- Frey, Felix. 2017. “SPSS (Software).” The International Encyclopedia of Communication Research Methods, November, 1–2. [Google Scholar]
- Harikrishnan, D., N. Sunil Kumar, Shelbi Joseph, and Kishor Krishnan Nair. (2019). “Towards a Fast and Secure Fingerprint Authentication System Based on a Novel Encoding Scheme.” International Journal of Electrical Engineering Education, October, 0020720919883803. [Google Scholar]
- Hassan, Md Arif, Zarina Shukur, and Mohammad Kamrul Hasan. (2020). “An Improved Time-Based One Time Password Authentication Framework for Electronic Payments.” Int. J. Adv. Comput. Sci. Appl 11 (11): 359–66. [Google Scholar]
- Le Quoc, Do, Franz Gregor, Jatinder Singh, and Christof Fetzer. (2019). “SGXPySpark: Secure Distributed Data Analytics.” In The World Wide Web Conference, 3564–3563. WWW ’19. New York, NY, USA: Association for Computing Machinery. [CrossRef] [Google Scholar]
- Pawade, Dipti, Avani Sakhapara, Melvita Andrade, Aishwarya Badgujar, and Divya Adepu. (2019). “Implementation of Fingerprint-Based Authentication System Using Blockchain.” In Soft Computing and Signal Processing, 233–42. Springer Singapore. [Google Scholar]
- Pieter, Wouda Hugo, and Raymond Opdenakker. (2019). “Blockchain Technology in Commercial Real Estate Transactions.” Journal of Property Investment & Finance 37 (6): 570–79. [CrossRef] [Google Scholar]
- Putro, Prasetyo Adi Wibowo, and Rizqy Rionaldy. (2019). “Implementation of the Park Schema on User Authentication Services Using Password-Based Web Codeigniter Library to Overcome Man in the Middle Attack.” In 2019 Fourth International Conference on Informatics and Computing (ICIC), 1–5. ieeexplore.ieee.org. [Google Scholar]
- Qasaimeh, Malik, Rawan Turab, and Raad S. Al-Qassas. (2019). “Authentication Techniques in Smart Grid: A Systematic Review.” TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (3): 1584–94. [CrossRef] [Google Scholar]
- Rajamanickam, Siranjeevi, Satyanarayana Vollala, Ruhul Amin, and N. Ramasubramanian. (2020). “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC.” IEEE Systems Journal 14 (2): 1972–83. [CrossRef] [Google Scholar]
- Ramasamy, Priya, Vidhyapriya Ranganathan, Venketesh Palanisamy, and Seifedine Kadry. (2020). “Securing One-Time Password Generation Using Elliptic-Curve Cryptography with Self-Portrait Photograph for Mobile Commerce Application.” Multimedia Tools and Applications 79 (23): 17081–99. [CrossRef] [Google Scholar]
- Rao, B. Bamleshwar, and Akhilesh A. Waoo. (2021). “DESIGN A NOVEL APPROACH FOR TOKEN BASED AUTHENTICATION IN IOT NETWORKS.” Ilkogretim Online 20 (4). https://www.ilkogretim-online.org/fulltext/218–1619851224.pdf. [Google Scholar]
- Sangeetha, T., M. Kumaraguru, S. Akshay, and M. Kanishka. (2021). “Biometric Based Fingerprint Verification System for ATM Machines.” Journal of Physics. Conference Series 1916 (1): 012033. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.