Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Authentication using Visual Cryptography

This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a...

متن کامل

Paper-based Document Authentication using Digital Signature and QR Code

Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi, Bangkok 10240 Thailand Abstract. There are still needs for paper-based documents in certain circumstances where electronic documents cannot efficiently replace them. For example, documents issued by the government such as birth certificates, driver li...

متن کامل

Tourist Satisfaction Enhancement Using Mobile QR Code Payment: An Empirical Investigation

Innovative technologies have greatly changed people’s lives, including their travel experiences. This study investigates the antecedents and outcomes of the quick response (QR) code payment technology used in tourism to provide empirical evidence that mobile technologies can be used to enhance tourist satisfaction. An empirical analysis using 247 field survey responses reveals that relative adv...

متن کامل

2CAuth: A New Two Factor Authentication Scheme Using QR-Code

Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present ‘2CA...

متن کامل

An effective Two Factor Authentication Method using QR code

The most prevalent form of login has used an ID and password which is classified 1 factor authentication. However the lax of security, user required the more secure way to login so firms have implemented 2 factor authentication involving OTP(One time Password). Despite the increased security, users must endure the inconvenience of downloading a program on their device and inputting a 6 to 8 dig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mobile Information Systems

سال: 2017

ISSN: 1574-017X,1875-905X

DOI: 10.1155/2017/4356038