Skip to main content

Showing 1–2 of 2 results for author: Smadi, B A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.09468  [pdf

    cs.CR cs.NI

    Secure Mobile Payment Architecture Enabling Multi-factor Authentication

    Authors: Hosam Alamleh, Ali Abdullah S. AlQahtani, Baker Al Smadi

    Abstract: The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  2. arXiv:2210.00175  [pdf

    cs.CR cs.LG

    Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Baker Al Smadi

    Abstract: Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various secur… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.