TITLE

Research of network payment system based on multi-factor authentication

AUTHOR(S)
Jiang Yuyan; Li Changxun
PUB. DATE
July 2014
SOURCE
Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 7, p437
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
With the increasing popularity of e-commerce, its safety performance have also been extensive attention, along with a need for a safe and efficient authentication system. This paper analyzes the main currently used authentication method, According to the defects present a combination of USB Key, static password and the new dynamic password authentication method of payment systems, which have greatly improved the security of online payment.
ACCESSION #
97356990

 

Related Articles

  • Password Authentication with Secured Login Interface at Application Layer. Agrawal, Vivek Kumar; Bharti, R. K.; Parihar, Bhawana // International Journal of Computer Science & Network Security;Sep2014, Vol. 14 Issue 9, p82 

    In this paper we present a innovative solution to the old problem of password security at application layer or input level. In our solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random single...

  • Multiple Key Exchange Protocol with high efficiency. Tong YI; Xuebao Li; Hongchao CHEN; Shuling ZHENG // International Journal of Digital Content Technology & its Applic;Apr2013, Vol. 7 Issue 8, p496 

    This paper first analyses two existing password-authenticated key exchange protocols for three-party and points out they are both insecure. In order to solve the problem that most of existing verifier-based 3pake protocols can not resist server key disclosure attack, we present an efficient...

  • An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without using Bilinear Pairings. Ramesh, S.; Bhaskaran, V. Murali // International Journal of Engineering & Technology (0975-4024);Dec2013/Jan2014, Vol. 5 Issue 6, p5140 

    Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. We have proposed a remote user authentication scheme based on ECC that establish strong authentication with key agreement. As the password verifier...

  • Secure Mutual Authentication Protocol. Nakhate, Seema P.; Goudar, R. M. // International Journal of Computer Networks & Communications Secu;Apr2014, Vol. 2 Issue 4, p142 

    In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication...

  • Digital Door Lock on the Access Control System using OTP-based User Authentication. Seung-Soo Shin; Kun-Hee Han; Kwang-Yoon Jin // International Journal of Digital Content Technology & its Applic;Jul2013, Vol. 7 Issue 11, p436 

    The access control system based on OTP is proposed to complement the drawbacks of the user authentication mechanism such as a digital door-lock and mechanical door-lock based. The proposed method does not need administrator's help to access the facility if the user must know OTP and has a...

  • Method of Authentication on Based Password Generators. Verlan, A. F.; Karimov, M. M.; Tashev, K. A.; Imamaliev, A. T. // Proceedings of the International Conference on Application of In;2013, p773 

    In this article the method of use of generators of pseudorandom numbers is offered at process of the authentication of the turned subject for protection of resources against unauthorized access in information and communication systems

  • Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems. Nassar, Nader; Miller, Grant // Folklore Forum;Jul2013, p260 

    Security for web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce applications, such as those used for transaction processing, could be placed in a position of not...

  • A New Payment Protocol Based on A Virtual Account for The Fourth- Party E-commerce. Yong Xu; Haiwen Chen; Rui Zing; Tinting Yan // International Journal of Digital Content Technology & its Applic;Jan2013, Vol. 7 Issue 1, p336 

    This paper at first points out that the existing payment system can't meet the needs of e - commerce, then puts forward the payment platform of fourth-party e-commerce. The platform achieves the integration of payment resources, which aims to provide unified authentication, unified payment,...

  • Firms Fail Payment Audits. Fitzgerald, Kate // American Banker;9/30/2011, Vol. 176 Issue F338, p6 

    The article discusses information from the Verizon Payment Card Industry Compliance Report which found only 21 percent of the companies surveyed met the 12 requirements of the Payment Card Industry data security standard.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics