Full Paper View Go Back
E – Authentication for Secure Net Banking
Mitul Chauhan1 , Gayatri Barapatre2 , Amruta Ghatge3 , Rajashri Sabale4 , Pooja Sakunde5
Section:Survey Paper, Product Type: Journal-Paper
Vol.10 ,
Issue.1 , pp.15-18, Feb-2022
Online published on Feb 28, 2022
Copyright © Mitul Chauhan, Gayatri Barapatre, Amruta Ghatge, Rajashri Sabale, Pooja Sakunde . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Mitul Chauhan, Gayatri Barapatre, Amruta Ghatge, Rajashri Sabale, Pooja Sakunde, “E – Authentication for Secure Net Banking,” International Journal of Scientific Research in Computer Science and Engineering, Vol.10, Issue.1, pp.15-18, 2022.
MLA Style Citation: Mitul Chauhan, Gayatri Barapatre, Amruta Ghatge, Rajashri Sabale, Pooja Sakunde "E – Authentication for Secure Net Banking." International Journal of Scientific Research in Computer Science and Engineering 10.1 (2022): 15-18.
APA Style Citation: Mitul Chauhan, Gayatri Barapatre, Amruta Ghatge, Rajashri Sabale, Pooja Sakunde, (2022). E – Authentication for Secure Net Banking. International Journal of Scientific Research in Computer Science and Engineering, 10(1), 15-18.
BibTex Style Citation:
@article{Chauhan_2022,
author = {Mitul Chauhan, Gayatri Barapatre, Amruta Ghatge, Rajashri Sabale, Pooja Sakunde},
title = {E – Authentication for Secure Net Banking},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2022},
volume = {10},
Issue = {1},
month = {2},
year = {2022},
issn = {2347-2693},
pages = {15-18},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2691},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2691
TI - E – Authentication for Secure Net Banking
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Mitul Chauhan, Gayatri Barapatre, Amruta Ghatge, Rajashri Sabale, Pooja Sakunde
PY - 2022
DA - 2022/02/28
PB - IJCSE, Indore, INDIA
SP - 15-18
IS - 1
VL - 10
SN - 2347-2693
ER -
Abstract :
Recent technological advances have resulted in a plethora of personal computing devices such as smartphones, tablets, watches, and eyewear, among others. This has helped them realize a digital world in which vital everyday tasks may be completed via the Internet from any location, at any time, and on any device. At the same time, improvements in pervasive computing technology have given birth to the notion of smart spaces, which aims to provide customized services to inhabitant in an automated manner. User authentication, or verifying a user`s identity, is critical in the digital world to safeguard personal data kept online (e.g., online bank accounts) and on personal devices (e.g., smart phones), as well as to enable tailored services in smart spaces (e.g., adjusting room temperature etc.). Traditional authentication methods (such as passwords or fingerprints) have recently been proved to be vulnerable to hacking. As a result, researchers have developed a slew of novel ways for authenticating users in the aforementioned scenarios. This study provides an overview of these unique systems in order to help guide future research in these areas.
Key-Words / Index Term :
Online Banking Authentication (OBA), Linear Regression, Classification, Machine Learning etc.
References :
[1] SYED W. SHAH AND SALIL S. KANHERE, “Recent Trends in User Authentication – A Survey.” Institute of Electrical and Electronics Engineers (IEEE), Vol 7, Issue. , pp.112505 – 112519, 2019.
[2] WENZHENG LIU, XIAOFENG WANG, WEIPENG, “State of the Art: Secure Mobile Payment.” Institute of Electrical and Electronics Engineers (IEEE), Vol 8, Issue. , pp. 13898 - 13914, 2020.
[3] Anum Tanveer Kiyani, Aboubaker Lasebae, Kamran Ali1 and Masood Ur-Rehman “Secure Online Banking with Biometrics”. In the Proceedings of the 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1-6, 2020.
[4] Divyans Mahansaria, Uttam Kumar Roy, “Secure Authentication for ATM transactions using NFC technology.” In the Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), 2019.
[5] Wen-Hui Lin, Bao-Hua Wu, Qian-Hua Huang, “A Face-Recognition Approach based on Secret Sharing for User Authentication in Public-Transportation Security.” In the Proceedings of the 2018 IEEE International Conference on Applied System Invention (ICASI), 2018.
[6] N. Clarke and S. Furnell “Authentication of users on mobile telephones – A survey of attitudes and practices.” In the Proceedings of the 2018 IEEE International Conference on Applied System Invention (ICASI), 2018.
[7] Andrew Bissada, Aspen Olmsted “Mobile Multi-Factor Authentication”, In the Proceedings of the 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017.
[8] Kavitha K, Saravanan, “SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES”, International Journal of Computer Sciences and Engineering (IJCSE), Vol-6, Issue-8, pp.34-39, 2018.
[9] Anil Lamba, “A Survey of various machine learning techniques used in Intrusion Detection System”, International Journal of Computer Sciences and Engineering (IJCSE), Vol-7, Issue-5, pp.557-563, 2019.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.