Skip to main content

Table 10 Technologies used in the previous studies from Table 8 [12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44]

From: Role of authentication factors in Fin-tech mobile transaction security

Categories

Technologies

References

Frequency

Authentication for transaction (AT)

Biometric

[17, 29, 32, 39, 42]

5

Graphical OTP

[20, 40]

2

Blockchain crypto and algorithms

[15, 16, 28, 37, 43]

5

NFC

[19, 31]

2

ML

[13]

1

CLS

[12, 23]

2

General

[44]

1

TRRS

[14]

1

SMS

[27, 30]

2

MFA protocols

[38]

1

Authentication for control access (ACA)

Biometric

[21, 24, 25, 35, 36]

5

Blockchain crypto and algorithms

[22]

1

MAC

[18]

1

ML

[33]

1

CLS

[34]

1

Message code

[26]

1

WSSN

[41]

1