{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:35:40Z","timestamp":1774953340301,"version":"3.50.1"},"reference-count":94,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T00:00:00Z","timestamp":1637798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.<\/jats:p>","DOI":"10.3390\/fi13120299","type":"journal-article","created":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T05:23:02Z","timestamp":1638163382000},"page":"299","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3234-6420","authenticated-orcid":false,"given":"Guma","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Information Technology Development and Management (ITDM), Nelson Mandela African Institution of Science and Technology (NM-AIST), Arusha 447, Tanzania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7143-8953","authenticated-orcid":false,"given":"Mussa Ally","family":"Dida","sequence":"additional","affiliation":[{"name":"Department of Information Technology Development and Management (ITDM), Nelson Mandela African Institution of Science and Technology (NM-AIST), Arusha 447, Tanzania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0865-9737","authenticated-orcid":false,"given":"Anael","family":"Elikana Sam","sequence":"additional","affiliation":[{"name":"Department of Communication Science and Engineering (CoSE), Nelson Mandela African Institution of Science and Technology (NM-AIST), Arusha 447, Tanzania"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.2021.0997","article-title":"FinTech as a Game Changer: Overview of Research Frontiers","volume":"32","author":"Hendershott","year":"2021","journal-title":"Inf. Syst. Res."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.3390\/jtaer16050080","article-title":"Customer Experience in Fintech","volume":"16","author":"Barbu","year":"2021","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4038\/sljer.v8i2.135","article-title":"\u201cFintech Services\u201d and the Future of Financial Intermediation: A Review","volume":"8","author":"Dharmadasa","year":"2021","journal-title":"Sri Lanka J. Econ. Res."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1080\/13563467.2020.1766432","article-title":"The Platform Political Economy of FinTech: Reintermediation, Consolidation and Capitalisation","volume":"26","author":"Langley","year":"2020","journal-title":"New Polit. Econ."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1287\/serv.2021.0270","article-title":"Frontiers in Service Science: Fintech Operations\u2014An Overview of Recent Developments and Future Research Directions","volume":"13","author":"Lu","year":"2021","journal-title":"Serv. Sci."},{"key":"ref_6","first-page":"30","article-title":"Fintech and Big Tech Credit: What Explains the Rise of Digital Lending?","volume":"22","author":"Cornelli","year":"2021","journal-title":"CESifo Forum"},{"key":"ref_7","unstructured":"Sharma, Y. (2020, May 10). Mobile Payments Market\u2014Global Opportunity Analysis and Industry Forecast, 2014\u20132022. Available online: www.alliedmarketresearch.com\/mobile-payments-market."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Jakhiya, M., Bishnoi, M.M., and Purohit, H. (April, January 4). Emergence and growth of mobile money in modern India: A study on the effect of mobile money. Proceedings of the 2020 Advances in Science and Engineering Technology International Conferences (ASET), Dubai, United Arab Emirates.","DOI":"10.1109\/ASET48392.2020.9118375"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ali, G., Dida, M.A., and Sam, A.E. (2020). Evaluation of key security issues associated with mobile money systems in Uganda. Information, 11.","DOI":"10.3390\/info11060309"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Egami, H., and Matsumoto, T. (2020). Mobile money use and healthcare utilization: Evidence from rural Uganda. Sustainability, 12.","DOI":"10.3390\/su12093741"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ali, G., Dida, M.A., and Sam, A.E. (2020). Two-factor authentication scheme for mobile money: A review of threat models and countermeasures. Future Internet, 12.","DOI":"10.3390\/fi12100160"},{"key":"ref_12","first-page":"1","article-title":"Securing Mobile Money Services in Tanzania: A Case of Vodacom M-Pesa","volume":"2","author":"Basigie","year":"2014","journal-title":"Int. J. Comput. Sci. Netw. Solut."},{"key":"ref_13","first-page":"9","article-title":"Improving Mobile Money Security with Two-Factor Authentication","volume":"109","author":"Mtaho","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_14","unstructured":"Mega, B. (2020). Framework for Improved Security on Usage of Mobile Money Application Based on Iris Biometric Authentication Method in Tanzania. [Master\u2019s Thesis, The University of Dodoma]."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Islam, I., Munim, K.M., Islam, M.N., and Karim, M.M. (2019, January 24\u201325). A proposed secure mobile money transfer system for SME in Bangladesh: An industry 4.0 perspective. Proceedings of the 2019 International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh.","DOI":"10.1109\/STI47673.2019.9068075"},{"key":"ref_16","unstructured":"Chetalam, J.L. (2018). Enhancing Security of MPesa Transactions by Use of Voice Biometrics. [Master\u2019s Thesis, The United States International University\u2014Africa]."},{"key":"ref_17","first-page":"3544","article-title":"High Correctness Mobile Money Authentication System","volume":"24","author":"Osman","year":"2020","journal-title":"Int. J. Psychosoc. Rehabil."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Okpara, O.S., and Bekaroo, G. (2017, January 6\u20139). Cam-Wallet: Fingerprint-based authentication in M-wallets using embedded cameras. Proceedings of the 2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC\/I & CPS Europe), Milan, Italy.","DOI":"10.1109\/EEEIC.2017.7977654"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Coneland, R., and Crespi, N. (2013, January 15\u201316). Wallet-on-wheels\u2014Using a vehicle\u2019s identity for secure mobile money. Proceedings of the 2013 17th International Conference on Intelligence in Next Generation Networks (ICIN), Venice, Italy.","DOI":"10.1109\/ICIN.2013.6670900"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hassan, M.A., and Shukur, Z. (2021, January 29\u201331). A secure multi factor user authentication framework for electronic payment system. Proceedings of the 2021 3rd International Cyber Resilience Conference (CRC), Langkawi Island, Malaysia.","DOI":"10.1109\/CRC50527.2021.9392564"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00122-1","article-title":"An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security","volume":"1","author":"Vincent","year":"2020","journal-title":"SN Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Castle, S., Pervaiz, F., Weld, G., Roesner, F., and Anderson, R. (2016, January 18\u201320). Let\u2019s talk money: Evaluating the security challenges of mobile money in the developing world. Proceedings of the 7th Annual Symposium on Computing for Development (ACM DEV\u201916), New York, NY, USA.","DOI":"10.1145\/3001913.3001919"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sharma, L., and Mathuria, M. (2018, January 19\u201320). Mobile banking transaction using fingerprint authentication. Proceedings of the 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India.","DOI":"10.1109\/ICISC.2018.8399016"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Phipps, R., Mare, S., Ney, P., Webster, J., and Heimerl, K. (2018, January 20\u201322). ThinSIM-based attacks on mobile money systems. Proceedings of the COMPASS \u201918: ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), New York, NY, USA.","DOI":"10.1145\/3209811.3209817"},{"key":"ref_25","unstructured":"Alhassan, N.S., Yusuf, M.O., Karmanje, A.R., and Alam, M. (2018, January 14\u201316). Salami attacks and their mitigation\u2014An overview. Proceedings of the 5th International Conference on Computing for Sustainable Global Development, New Delhi, India."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.35940\/ijeat.B3601.129219","article-title":"Four Most Famous Cyber Attacks for Financial Gains","volume":"9","author":"Altwairqi","year":"2019","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.cose.2020.102116","article-title":"A systematic review of PIN-entry methods resistant to shoulder-surfing attacks","volume":"101","author":"Binbeshr","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"AbouSteit, M.H.S., Tammam, A.F., and Wahdan, A. (2020, January 27\u201328). A novel approach for generating one-time password with secure distribution. Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK.","DOI":"10.1109\/WorldS450073.2020.9210322"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Anusha, N., Sai, A.D., and Srikar, B. (2017, January 22\u201324). Locker security system using facial recognition and One Time Password (OTP). Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2017.8299874"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zadeh, M.J., and Barati, H. (2019, January 26\u201328). Security improvement in mobile baking using hybrid authentication. Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, Istanbul, Turkey.","DOI":"10.1145\/3369114.3369151"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Iftikhar, J., Hussain, S., Mansoor, K., Ali, Z., and Chaudhry, S.A. (2019, January 6\u20137). Symmetric-key multi-factor biometric authentication scheme. Proceedings of the 2nd International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, Pakistan.","DOI":"10.1109\/C-CODE.2019.8680999"},{"key":"ref_32","first-page":"578","article-title":"The Significant Role of Smartphones in Improving Consumer\u2019s Quality of Life","volume":"7","author":"Devendra","year":"2021","journal-title":"Int. J. Adv. Res. Innov. Ideas Educ."},{"key":"ref_33","first-page":"1","article-title":"Preventing Counterfeit Products using Cryptography, QR Code and Webservice","volume":"11","author":"Shaik","year":"2021","journal-title":"Comput. Sci. Eng. Int. J."},{"key":"ref_34","first-page":"22","article-title":"The Shifting of or Code-Based Payment Method to Improve the Competitive Advantage (Ca) at Bank Jatim through Tam Model Approach","volume":"23","author":"Kurniawan","year":"2021","journal-title":"IOSR J. Bus. Manag."},{"key":"ref_35","first-page":"3805","article-title":"Enhancing Data Storage of or Code Using C3M Technique","volume":"7","author":"Sabri","year":"2020","journal-title":"Eur. J. Mol. Clin. Med."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cho, J., Seo, G.W., Lee, J.S., Cho, H.K., Kang, E.M., Kim, J., Chun, D.-I., Yi, Y., and Won, S.H. (2021). The usefulness of the QR code in orthotic applications after orthopaedic surgery. Healthcare, 9.","DOI":"10.3390\/healthcare9030298"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1109\/LSP.2020.3006375","article-title":"The Nested QR Code","volume":"27","author":"Chou","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_38","unstructured":"Din, M.M., Anwar, R.M., and Fazal, F.A. (2021, January 18\u201319). Asset tagging for library system-does QR relevant?. Proceedings of the International Conference on Applied and Practical Sciences ICAPS (2021), Kuala Lumpur, Malaysia."},{"key":"ref_39","first-page":"7","article-title":"Enhanced Business Marketing for Small Scale Enterprises Via the Quick Response Code Technology","volume":"1","author":"Onyinyechi","year":"2021","journal-title":"Frontiers"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"10285","DOI":"10.1007\/s11042-020-10075-5","article-title":"Encrypted digital watermarking algorithm for quick response code using discrete cosine transform and singular value decomposition","volume":"80","author":"Sun","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_41","first-page":"939","article-title":"An Investigation of Behavioral Intention Towards QR Code Payment in Bangkok, Thailand","volume":"8","author":"Suebtimrat","year":"2021","journal-title":"J. Asian Financ. Econ. Bus."},{"key":"ref_42","first-page":"391","article-title":"Factors Affecting Consumer Intention on QR Payment of Mobile Banking: A Case Study in Indonesia","volume":"8","author":"Kosim","year":"2021","journal-title":"J. Asian Financ. Econ. Bus."},{"key":"ref_43","first-page":"1","article-title":"Design of Waste Management System Using QR Code for Effective Management in Wastebank","volume":"1764","author":"Widaningsih","year":"2021","journal-title":"J. Phys."},{"key":"ref_44","first-page":"76","article-title":"Use of QR code technology in eastern Thailand: Entrepreneur perspective","volume":"26","author":"Chaveesuk","year":"2021","journal-title":"Utop\u00eda Prax. Latinoam."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1364\/OE.423923","article-title":"Floating quick response code based on structural black color with the characteristic of privacy protection","volume":"29","author":"Tao","year":"2021","journal-title":"Opt. Express"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Ximenes, A.M., Sukaridhoto, S., Sudarsono, A., Albaab, M.R., Basri, H., Yani, M.A., and Islam, E. (2019, January 27\u201328). Implementation QR code biometric authentication for online payment. Proceedings of the 2019 International Electronics Symposium (IES), Surabaya, Indonesia.","DOI":"10.1109\/ELECSYM.2019.8901575"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Roy, A., and Nag, A. (2017). Biometric authentication. Advances in User Authentication, Springer.","DOI":"10.1007\/978-3-319-58808-7"},{"key":"ref_48","first-page":"114","article-title":"Biometrics and Fingerprint Payment Technology","volume":"5","author":"Priya","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci. Technol."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","article-title":"50 years of biometric research: Accomplishments, challenges, and opportunities","volume":"79","author":"Jain","year":"2015","journal-title":"Pattern Recognit. Lett."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"315","DOI":"10.15837\/ijccc.2016.3.2556","article-title":"Biometrics Systems and Technologies: A survey","volume":"11","author":"Buciu","year":"2016","journal-title":"Int. J. Comput. Commun. Control"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"52","DOI":"10.3923\/tb.2016.52.58","article-title":"Fingerprint Biometric Systems","volume":"9","author":"Faridah","year":"2016","journal-title":"Trends Bioinform."},{"key":"ref_52","unstructured":"Fingerprints (2021, May 16). Biometric Technologies. Available online: https:\/\/www.fingerprints.com\/asset\/assets\/downloads\/fingerprints-biometric-technologies-whitepaper-2017-revb.pdf."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"61768","DOI":"10.1109\/ACCESS.2021.3071501","article-title":"Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1553","DOI":"10.1109\/TCSI.2021.3054758","article-title":"A New Message Expansion Structure for Full Pipeline SHA-2","volume":"68","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Al-Odat, Z., Abbas, A., and Khan, S.U. (2019, January 16\u201318). Randomness analyses of the secure hash algorithms, SHA-1, SHA-2 and modified SHA. Proceedings of the 2019 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan.","DOI":"10.1109\/FIT47737.2019.00066"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42787-019-0037-6","article-title":"Secure Hash Algorithm-2 formed on DNA","volume":"27","author":"Nassr","year":"2019","journal-title":"J. Egypt. Math. Soc."},{"key":"ref_57","first-page":"43","article-title":"Review Paper on Secure Hash Algorithm with Its Variants","volume":"3","author":"Aradhana","year":"2017","journal-title":"Int. J. Tech. Innov. Mod. Eng. Sci."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"72443","DOI":"10.1109\/ACCESS.2019.2920089","article-title":"A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs","volume":"7","author":"Martino","year":"2019","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.iot.2020.100254","article-title":"Designing a SHA-256 processor for blockchain-based IoT applications","volume":"11","author":"Martino","year":"2020","journal-title":"Internet Things"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Sghaier, A., Zeghid, M., Massoud, C., and Machout, M. (2017). Design and implementation of low area\/power elliptic curve digital signature hardware core. Electronics, 6.","DOI":"10.3390\/electronics6020046"},{"key":"ref_61","first-page":"127","article-title":"A Security Evaluation of FIDO\u2019s UAF Protocol in Mobile and Embedded Devices","volume":"766","author":"Panos","year":"2017","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Feng, H., Li, H., Pan, X., Zhao, Z., and Cactilab, T. (2021, January 21\u201325). A formal analysis of the FIDO UAF protocol. Proceedings of the Network and Distributed Systems Security (NDSS) Symposium 2021, San Diego, CA, USA.","DOI":"10.14722\/ndss.2021.24363"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Purnomo, A.T., Gondokaryono, Y.S., and Kim, C.S. (2016, January 3\u20134). Mutual authentication in securing a mobile payment system using encrypted QR code based on Public Key Infrastructure. Proceedings of the 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia.","DOI":"10.1109\/ICSEngT.2016.7849649"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Sharma, N., and Bohra, B. (2017, January 9\u201310). Enhancing online banking authentication using the hybrid cryptographic method. Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India.","DOI":"10.1109\/CIACT.2017.7977275"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Hassan, M.A., Shukur, Z., and Hasan, M.K. (2020). An efficient secure electronic payment system for e-commerce. Computers, 9.","DOI":"10.3390\/computers9030066"},{"key":"ref_66","first-page":"34","article-title":"Design of secure and efficient electronic payment system for mobile users","volume":"Volume 1","author":"Mohit","year":"2017","journal-title":"International Conference on Mathematics and Computing"},{"key":"ref_67","first-page":"891","article-title":"Enhancing user authentication for mobile wallet using cryptographic algorithm","volume":"10","author":"Susanna","year":"2018","journal-title":"J. Adv. Res. Dyn. Control Syst."},{"key":"ref_68","first-page":"41","article-title":"A Study on Secure Mobile Payment Service for the Market Economy Revitalization","volume":"18","author":"Kim","year":"2017","journal-title":"J. Korea Acad. Ind. Coop. Soc."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/9149730","article-title":"Efficient multi-factor two-server authenticated scheme under mobile cloud computing","volume":"2018","author":"Han","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_70","first-page":"85","article-title":"Review of the suitability to introduce new identity verification means in South Korea: Focused on Block Chain and FIDO","volume":"8","author":"Shin","year":"2018","journal-title":"J. Converg. Inf. Technol."},{"key":"ref_71","unstructured":"Canales, C. (2021, April 02). FIDO Alliance Overview. Available online: https:\/\/novugens.com\/wp-content\/uploads\/2020\/03\/ID37-FIDO-Alliance-2.pdf."},{"key":"ref_72","first-page":"453","article-title":"Enhanced Honey Encryption Algorithm on e-mail with Increased Message Space","volume":"3","author":"Singh","year":"2020","journal-title":"Int. J. Res. Eng. Sci. Manag."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.comcom.2020.01.033","article-title":"Enhancement of e-commerce security through asymmetric key algorithm","volume":"153","author":"Dijesh","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.jart.2015.06.020","article-title":"A mobile medical QR-code authentication system and its automatic FICE image evaluation application","volume":"13","author":"Chang","year":"2015","journal-title":"J. Appl. Res. Technol."},{"key":"ref_75","first-page":"1116","article-title":"QR Code Based Data Transmission in Mobile Devices Using AES Encryption","volume":"5","author":"Asok","year":"2016","journal-title":"Int. J. Sci. Res."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Mittra, P., and Rakesh, N. (2016, January 26\u201327). A desktop application of QR code for data security and authentication. Proceedings of the 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India.","DOI":"10.1109\/INVENTIVE.2016.7824809"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Goel, N., Sharma, A., and Goswami, S. (2017, January 5\u20136). A way to secure a QR code: SQR. Proceedings of the 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/CCAA.2017.8229850"},{"key":"ref_78","first-page":"82","article-title":"Encrypted QR Code System","volume":"2","author":"Husny","year":"2017","journal-title":"J. Comput. Technol. Creat. Content"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.17706\/jcp.13.9.1075-1088","article-title":"Designing a Novel Hybrid Algorithm for QR-Code Images Encryption and Steganography","volume":"13","author":"Soltani","year":"2018","journal-title":"J. Comput."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Ghodke, A.V., and Dagade, R.V. (2018, January 6\u20138). Electronic secure vehicle verification system using advanced Digi-locker system. Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India.","DOI":"10.1109\/I2CT.2018.8529450"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Arief, A.T., Wirawan, W., and Suprapto, Y.K. (2019, January 28\u201329). Authentication of printed document using quick response (QR) code. Proceedings of the 2019 International Seminar on Intelligent Technology and Its Applications (ISITIA), Surabaya, Indonesia.","DOI":"10.1109\/ISITIA.2019.8937084"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Wahsheh, H.A.M., and Luccio, F.L. (2020). Security and privacy of QR code applications: A comprehensive study, general guidelines and solutions. Information, 11.","DOI":"10.3390\/info11040217"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"209","DOI":"10.24036\/jptk.v3i4.14823","article-title":"Implementation of AES-192 Cryptography and QR Code to Verify the Authenticity of Budi Luhur University Student Certificate","volume":"3","author":"Pramusinto","year":"2020","journal-title":"J. Pendidik. Teknol. Kejuru."},{"key":"ref_84","unstructured":"Carter, R.A., Anton, A.I., Dagnino, A., and Williams, L. (2001, January 27\u201331). Evolving beyond requirements creep: A risk-based evolutionary prototyping model. Proceedings of the Fifth IEEE International Symposium on Requirements Engineering, Toronto, ON, Canada."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3991\/ijet.v14i13.10709","article-title":"Design and Implementation of a Vue. js-Based College Teaching System How to Work with This Template","volume":"14","author":"Song","year":"2019","journal-title":"Int. J. Emerg. Technol. Learn."},{"key":"ref_86","unstructured":"Yun, Q. (2019, January 30\u201331). Design and implementation of E-commerce platform based on Vue.js and MySQL. Proceedings of the 3rd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2019), Wuhan, China."},{"key":"ref_87","unstructured":"Kyriakidis, A., Maniatis, K., and You, E. (2017). The Majesty of Vue.js 2, Lean Publishing."},{"key":"ref_88","unstructured":"Macrae, C. (2018). Vue.js: Up and Running\u2014Building Accessible and Performant Web Apps, O\u2019Reilly Media."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-981-15-6014-9_50","article-title":"Template-Based Transliteration of Braille Character to Gujarati Text\u2014The Application","volume":"1187","author":"Vyas","year":"2021","journal-title":"Rising Threat. Expert Appl. Solut."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"6109","DOI":"10.48084\/etasr.3435","article-title":"A Web-based Monitoring and Evaluation System for Government Projects in Tanzania: The Case of Ministry of Health","volume":"10","author":"Mpawe","year":"2020","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Sadeq, M.J., Rayhan, K.S., Akter, M., Forhat, R., Haque, R., and Akhtaruzzaman, M. (2020, January 20\u201321). Integration of blockchain and remote database access protocol-based database. Proceedings of the Fifth International Congress on Information and Communication Technology, London, UK.","DOI":"10.1007\/978-981-15-5859-7_53"},{"key":"ref_92","unstructured":"Geetha, V., Anbumani, V., Selvi, T., Sindhuja, C.S., and Vanathi, S. (2020, January 15). IoT based well-organized hostel power consumption and attendance administration system. Proceedings of the International Virtual Conference on Robotics, Automation, Intelligent Systems and Energy (IVC RAISE 2020), Perundurai, India."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1007\/s11277-016-3393-7","article-title":"Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography","volume":"90","author":"Ray","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"ElGhanam, E., Ahmed, I., Hassan, M., and Osman, A. (2021). Authentication and billing for dynamic wireless EV charging in an internet of electric vehicles. Future Internet, 13.","DOI":"10.3390\/fi13100257"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/12\/299\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:35:57Z","timestamp":1760168157000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/12\/299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,25]]},"references-count":94,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["fi13120299"],"URL":"https:\/\/doi.org\/10.3390\/fi13120299","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,25]]}}}