Amal Saha

According to our database1, Amal Saha authored at least 5 papers between 2014 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs.
CoRR, 2015

2014
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution.
CoRR, 2014

Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments.
CoRR, 2014

Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program.
CoRR, 2014

Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems.
CoRR, 2014


  Loading...