8,070 research outputs found

    S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard

    Get PDF
    Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments. Consumers dependency on mobile needs, make people take a little bit more interest in mobile banking. The use of the one-time password which is sent to the user mobile phone by short message service (SMS) is a vulnerability which we want to solve with proposing a new scheme called S-Mbank. We replace the authentication using the one-time password with the contactless smart card to prevent attackers to use the unencrypted message which is sent to the user's mobile phone. Moreover, it deals vulnerability of spoofer to send an SMS pretending as a bank's server. The contactless smart card is proposed because of its flexibility and security which easier to bring in our wallet than the common passcode generators. The replacement of SMS-based authentication with contactless smart card removes the vulnerability of unauthorized users to act as a legitimate user to exploit the mobile banking user's account. Besides that, we use public-private key pair and PIN to provide two factors authentication and mutual authentication. We use signcryption scheme to provide the efficiency of the computation. Pair based text authentication is also proposed for the login process as a solution to shoulder-surfing attack. We use Scyther tool to analyze the security of authentication protocol in S-Mbank scheme. From the proposed scheme, we are able to provide more security protection for mobile banking service.Comment: 6 page

    On Sevillian guilds towards the end of the 11th century

    Get PDF
    In the third decade of the 20th century, Lévi-Provençal discovered an Arab manuscript by the ishbīlī Ibn cAbdūn, that dealt with the commercial and artisan practices in Seville at the end of the 11th century. In the document there were references to the offices and personages who had to perform certain functions in various professions. From this manuscript, Lévi-Provençal deduced the existence of 11th-century Islamic guilds in Seville. This idea was assumed by Spanish historians, even up until the final decade of the 20th century. In the present article, the basis which sustained such an idea is analyzed with particular emphasis on the treatise by Ibn cAbdūn, since this is the only work that describes the economy of Seville at the time of Classic Islam (before the 12th century), and since this is the principal historical source cited by recent historians as a guarantee of the existence of Sevillian guilds during the Classic Islam; however, other manuscripts of Islamic authors of al-Andalus, and articles of contemporary authors are also taken into account. The result of our investigation disproves the existence of 11th century Islamic guilds in SevilleEn la tercera década del siglo XX Lévi-Proveçal descubrió un manuscrito árabe del išbīlī Ibn cAbdūn, donde se tratan las prácticas comerciales y artesanales en Sevilla a finales del siglo XI. En él hay referencias a los oficios y a personajes que debían cumplir determinadas funciones sobre la profesión. De ahí Lévi-Provençal dedujo la existencia de gremios islámicos en Sevilla. Esta idea resultó ser sugestiva y fue asumida por historiadores españoles del siglo XX, incluso en la década final de ese siglo. En el presente artículo se analizan las bases que sustentaron tal idea, haciéndose especial hincapié en el Tratado de Ibn cAbdūn por ser la única obra que se refiere a la economía de Sevilla en la época del islam clásico (antes del siglo XII) y la principal fuente histórica mencionada por dichos historiadores recientes como garantía de la existencia de gremios sevillanos durante el islam; sin embargo, también se tendrán en cuenta otros manuscritos de autores islámicos de al-Andalus y artículos de autores contemporáneos. El resultado de nuestra investigación refuta la existencia de gremios islámicos en la Sevilla del siglo X

    Credit Card Security System and Fraud Detection Algorithm

    Get PDF
    Credit card fraud is one of the most critical threats affecting individuals and companies worldwide, particularly with the growing number of financial transactions involving credit cards every day. The most common threats are likely to come from database breaches and identity theft. All these threats threat put the security of financial transactions at severe risk and require a fundamental solution. This dissertation aims to suggest a secure online payment system that significantly improves credit card security. Our system can be particularly resilient to potential cyber-attacks, unauthorized users, man-in-the-middle, and guessing attacks for credit card number generation or illegal financial activities by utilizing a secure communication channel between the cardholder and server. Our system uses a shared secret and a verification token that allow both sides to communicate through encrypted information. Furthermore, our system is designed to generate a one-time credit card number at the user’s machine that is verified by the server without sharing the credit card number over the network. Our approach combines the machine learning (ML) algorithms with unique temporary credit card numbers in one integrated system, which is the first approach in the online credit card protection system. The new security system generates a one-time-use credit card number for each transaction with a predetermined amount of money. Simultaneously, the system can detect potential fraud utilizing ML algorithm with new critical features such as the IMEI or I.P. address, the transaction’s location, and other features. The contribution of this research is two-fold: (1) a method is proposed to generate a unique, authenticatable one-time credit card number to effectively defend against the database breaches, and (2) a credit card fraud prevention system is proposed with multiple security layers that are achieved by the integration of authentication, ML-based fraud detection, and the one-time credit card number generation. The dissertation improves consumers’ trust and confidence in the credit card system’s security and enhances satisfaction with credit cards’ various financial transactions. Further, the system uses the current online credit card infrastructure; hence it can be implemented without tangible infrastructure cost

    CONTACT JUGGLING AT THE PRIMARY LEVEL OF STUDY STUDENT

    Get PDF
    The article analyzes and describes the features of the contact juggling student at the primary level of education. We analyze the characteristics and specifics of contact juggling. Cover certain concepts juggling. Analyzed scientific works on juggling and analysis of juggling combinations. The article deals with the chronology of juggling and contact juggling in the world. Described stage method and the use of various tricks on stage of contact juggling. Specific features of working with different types of props.Key words: juggling, contact juggling, circus, props, stage method

    CONTACT JUGGLING AT THE PRIMARY LEVEL OF STUDY STUDENT

    Get PDF
    The article analyzes and describes the features of the contact juggling student at the primary level of education. We analyze the characteristics and specifics of contact juggling. Cover certain concepts juggling. Analyzed scientific works on juggling and analysis of juggling combinations. The article deals with the chronology of juggling and contact juggling in the world. Described stage method and the use of various tricks on stage of contact juggling. Specific features of working with different types of props.Key words: juggling, contact juggling, circus, props, stage method

    Securing Internet Applications from Routing Attacks

    Full text link
    Attacks on Internet routing are typically viewed through the lens of availability and confidentiality, assuming an adversary that either discards traffic or performs eavesdropping. Yet, a strategic adversary can use routing attacks to compromise the security of critical Internet applications like Tor, certificate authorities, and the bitcoin network. In this paper, we survey such application-specific routing attacks and argue that both application-layer and network-layer defenses are essential and urgently needed. While application-layer defenses are easier to deploy in the short term, we hope that our work serves to provide much needed momentum for the deployment of network-layer defenses

    East Looks West: East European Travel Writing on Europe

    Get PDF

    DOES CRIME AFFECT FIRM PERFORMANCE: EVIDENCE FROM POST-TRANSITION ECONOMIES

    Get PDF
    The paper addresses the relatively unexplored issue of the effects of crime against business on firm performance in post-transition economies. The focus is on the eight countries: Bosnia and Herzegovina, Bulgaria, Croatia, Czechia, Montenegro, Serbia, Slovakia, and Slovenia. Based on the comparable microdata from World Bank Enterprise Survey the analysis shows that respondents in firms who suffered crime losses are in general more likely to expect a decrease in their sales in the next fiscal period. It has been also established that in some countries those who experienced crime losses are more optimistic about the possibility to increase the sales in the short-run (Slovakia, Montenegro, and Croatia), thus indicating certain resilience to adverse effects of crime. The estimates of the multinomial model suggest that crime exposure negatively affects business activity. However, the effect was only significant for those who expect decreases in their activity – respondents who experienced losses attributed to crime are 5.9% more likely to expect a decrease in their future sales (in comparison to maintain the same level of sales)
    corecore