International Journal of Soft Computing
Year:
2014
Volume:
9
Issue:
1
Page No.
1 - 9
References
Brainard, J., A. Juels, R.L. Rivest, M. Szydlo and M. Yung, 2006. Fourth-Aspect Authentication: Somebody You Know. ACM CCS, pp: 168-178
Herzberg, A., 2003. Payments and banking with mobile personal devices. Commun. ACM, 46: 53-58.
CrossRef | Josang, A. and G. Sanderud, 2003. Security in mobile communications: Challenges and opportunities. Proc. Aust. Inform. Secur. Workshop Conf. ACSW Frontiers, 21: 43-48.
Mallat, N., M. Rossi and V. Tuunainen, 2004. Mobile banking services. Commun. ACM, 47: 42-46.
Medrano, A., 2008. Online banking security-layers of protection. http://ezinearticles.com/?Online-Banking-Security---Layers-of-Protection&id=1353184.
Schneier, B., 2005. Two-Aspect Authentication: Too Little, Too Late. Commun. ACM, 48: 136-136.
CrossRef |