From: Role of authentication factors in Fin-tech mobile transaction security
Category | References | q1 | q2 | q3 | q4 | q5 | Total |
---|---|---|---|---|---|---|---|
C1 | [13,14,15,16,17,18,19,20,21,22,23,24,25, 27,28,29, 31,32,33,34,35,36,37, 39, 42, 43, 68, 70, 75, 91, 93, 94] | 1 | 1 | 1 | 1 | 0 | 4 |
C2 | [54] | 1 | 0 | 1 | 1 | 0 | 3 |
C3 | 1 | 1 | 0 | 1 | 0 | 3 | |
C4 | 0 | 1 | 1 | 1 | 0 | 3 | |
C5 | [26, 30, 38, 40, 45,46,47,48, 51, 52, 55,56,57,58,59,60, 62,63,64, 66, 69, 71, 74, 76, 77, 82, 86, 90, 96, 97, 100, 104] | 1 | 0 | 0 | 1 | 0 | 2 |
C6 | [41, 50, 53, 61, 65, 72, 73, 76, 78, 80, 83,84,85, 87, 92, 95, 99] | 1 | 0 | 0 | 0 | 0 | 1 |
C7 | 0 | 0 | 0 | 1 | 0 | 1 | |
C8 | 0 | 0 | 0 | 1 | 1 | 2 |