Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/15107
Full metadata record
DC FieldValueLanguage
dc.contributor.authorThawre G.
dc.contributor.authorBahekar N.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:16:27Z-
dc.date.available2021-05-05T10:16:27Z-
dc.date.issued2020
dc.identifier.citation2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. -en_US
dc.identifier.urihttps://doi.org/10.1109/ICCCNT49239.2020.9225428
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/15107-
dc.description.abstractIn the digital payment system, the transactions and their data about clients are very sensitive, so the security and privacy of personal information of the client is a big concern. The confirmation towards security necessities prevents the data from a stolen and unauthorized person over the digital transactions, So the stronger authentication methods required, which must be based on cryptography. Initially, in the payment ecosystem, they were using the Kerberos protocol, but now different approaches such as Challenge-Handshake Authentication Protocol (CHAP), Tokenization, Two-Factor Authentication(PIN, MPIN, OTP), etc. such protocols are being used in the payment system. This paper presents the use cases of different authentication protocols. Further, the use of these protocols in online payment systems to verify each individual are explained. © 2020 IEEE.en_US
dc.titleUse Cases of Authentication Protocols in the Context of Digital Payment Systemen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.