Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15617
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMuhammad-Bello, B.L.-
dc.contributor.authorAlhassan, M.E.-
dc.contributor.authorGaniyu, S.O.-
dc.date.accessioned2022-12-20T11:34:24Z-
dc.date.available2022-12-20T11:34:24Z-
dc.date.issued2015-
dc.identifier.issn0975–8887-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/15617-
dc.description.abstractThe increase of automated teller machine (ATM) frauds has actuated the development of new authentication mechanisms that can overcome the security problems associated with the personal identification numbers (PIN). The traditional PIN entry system has stood the test of time mainly because of its speed and memorability which are part of the metrics used to access the ATM authentication system. The third metric, which is security has often been compromised thence the need for a more secured authentication system for ATM operations. This paper therefore proposes an enhanced ATM security system using second level authentication process. The method adopted for this research is to develop an enhancement of the existing system by building an additional security mechanism on the existing system‟s security mechanism. The proposed system was found to be realistic and cost effective when compared to other proposed authentication mechanism for ATM transactions.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Computer Applicationsen_US
dc.relation.ispartofseries111;5-
dc.subjectAuthenticationen_US
dc.subjectATM Securityen_US
dc.subjectSecond-Level Authenticationen_US
dc.subjectATMen_US
dc.titleAn Enhanced ATM Security System using Second-Level Authenticationen_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology

Files in This Item:
File Description SizeFormat 
An Enhanced ATM Security System using Second-Level Authentication.pdf718.03 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.