Skip to main content
    • by 
    •   7  
      Information TechnologyInformation SecurityComputer SecurityPKI
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
    • by 
    •   12  
      Computer ScienceInformation SecurityComputer SecurityCryptography
    • by 
    •   15  
      Information TechnologyInformation SecurityComputer SecurityDigital Identity
Two-factor authentication can significantly reduce risks of compromised accounts by protecting from weak passwords, online identity theft and other online fraud. This paper presents a new easy solution to implement two-factor... more
    • by 
    •   5  
      Computer SecurityAuthenticationWi-FiOne Time Password Technique