{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:30:30Z","timestamp":1729614630095,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/ccece.2016.7726820","type":"proceedings-article","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T16:40:37Z","timestamp":1478191237000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A review of mobile banking security"],"prefix":"10.1109","author":[{"given":"Leili","family":"Nosrati","sequence":"first","affiliation":[]},{"given":"Amir Massoud","family":"Bidgoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"A Comparative Survey of Symmetric Encryption Techniques for Wireless Devices","volume":"2","author":"patil","year":"2013","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586113"},{"key":"ref31","first-page":"975","article-title":"Symmetric Algorithm Survey: A Comparative Analysis","volume":"61","author":"ebrahimi","year":"2013","journal-title":"International Journal of Computer Applications"},{"journal-title":"Comparison of ciphers","article-title":"Summary of Algorithms","year":"0","key":"ref30"},{"journal-title":"IEEE International Conference and Workshop on Computing and Communication (lEMCON)","article-title":"Security assessment of Mobile- Banking","year":"2015","key":"ref37"},{"key":"ref36","article-title":"The RC6 Cipher","author":"rivest","year":"1998","journal-title":"1&#x201C;&#x2018;AES Conference"},{"key":"ref35","article-title":"A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography","volume":"3","author":"sekhar","year":"2012","journal-title":"Mrudula Sarvabhatla ACEEE Int J on Network Security"},{"key":"ref34","first-page":"260","article-title":"A pro-posal to improve the security of mobile banking applications","author":"elkhodr","year":"2012","journal-title":"9th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering)"},{"year":"2015","key":"ref10","article-title":"Cognizant Mobile Banking Security: Challenges, Solutions"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1174175"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.7.766"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.9790\/0661-131114121"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5430\/bmr.v2n1p31"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14257\/ijunesst.2014.7.6.10"},{"article-title":"Mobile malware rises by 155 per cent as Android platform risks grow","year":"2012","author":"morgan","key":"ref16"},{"journal-title":"Data Encryption Standard Federal Information Processing Standard (FIPO) Publication 46 National Bureau of Standards","year":"1977","key":"ref17"},{"key":"ref18","first-page":"22","article-title":"Technology Trust and Mobile Banking Satisfaction: A Case of Malaysian Consumers","author":"masrek","year":"2013","journal-title":"International Conference on Innovation Management and Technology Research"},{"article-title":"Strength Assessment of Encryption Algorithms","year":"2000","author":"elbaz","key":"ref19"},{"key":"ref28","first-page":"38","article-title":"The Blowfish encryption algorithm9","volume":"19","author":"schneier","year":"1994","journal-title":"Dr Dobb's Journal of Software Tools"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5430\/bmr.v2n1p31"},{"key":"ref27","first-page":"233","article-title":"Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC 2, and TEA","author":"john","year":"1997","journal-title":"Lecture Notes in Computer Science 1334"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.06.013"},{"key":"ref6","article-title":"Surfing the Payment Channels, Mastering the Fraud Tsunami","author":"pitts","year":"2010","journal-title":"JDP Enterprises"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_16"},{"key":"ref5","article-title":"Group Key Management Protocols: A Novel Taxonomy","volume":"2","author":"challal","year":"2005","journal-title":"International Journal of Information Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-12-2012-0068"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2012.03.312"},{"journal-title":"The South Korean Fake Banking App Scam","year":"2015","author":"huang","key":"ref9"},{"key":"ref1","article-title":"FoneAstra: Making mobile phones smarter","author":"chaudhri","year":"2009","journal-title":"Workshop on Networked Systems for Developing Regions"},{"journal-title":"Architectural Analysis of Cryptographic Applications for Network Processors","year":"2008","author":"xie","key":"ref20"},{"key":"ref22","first-page":"975","article-title":"Symmetric Algorithm Survey: A Comparative Analysis","volume":"61","author":"ebrahimi","year":"2013","journal-title":"International Journal of Computer Applications"},{"journal-title":"Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)","article-title":"Alternative Graphical Authentication for Online Banking Environments","year":"0","key":"ref21"},{"key":"ref24","article-title":"The RC6 Cipher","author":"rivest","year":"1998","journal-title":"AES conference"},{"key":"ref23","volume":"106","author":"nechvatal","year":"2001","journal-title":"Report on the Development of the Advanced Encryption Standard (AES)"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-58108-1_16","article-title":"TEA, a tiny encryption algorithm","volume":"1008","author":"wheeler","year":"1994","journal-title":"Proc Int Workshop Fast Software Encrypt"},{"key":"ref25","first-page":"389","article-title":"A proposal for a new block encryption standard","author":"lai","year":"1990","journal-title":"Proceedings of the EUROCRYPT 90 Conference"}],"event":{"name":"2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2016,5,15]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2016,5,18]]}},"container-title":["2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7589833\/7726593\/07726820.pdf?arnumber=7726820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:45:28Z","timestamp":1498344328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7726820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ccece.2016.7726820","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}