Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Credit Card Fraud Detection Using Biometric Fingerprint Authentication

Publication Type:

Journal Article

Authors:

Anju Kumari; Deepti Tamhane; Komal Rani; Ashwini Walunj

Source:

IJSART, Volume 4, Issue 12 (2018)
  • 580 reads
  • Google Scholar
  • RTF
  • XML

References

Chang, Chin-Chen, and Jung- San Lee. "An Efficient and Secure Remote Authentication Scheme Using Smart Cards." Information & Security: An International Journal 18 (2006): 122-133.
  • Downloads
  • How to cite
No files have yet been downloaded.
APA style: Kumari, A., Tamhane D., Rani K., & Walunj A. (2018).  Credit Card Fraud Detection Using Biometric Fingerprint Authentication. IJSART. 4(12), 
Chicago style: Kumari, Anju, Deepti Tamhane, Komal Rani, and Ashwini Walunj. "Credit Card Fraud Detection Using Biometric Fingerprint Authentication." IJSART 4, no. 12 (2018).
IEEE style: Kumari, A., D. Tamhane, K. Rani, and A. Walunj, "Credit Card Fraud Detection Using Biometric Fingerprint Authentication", IJSART, vol. 4, issue 12, December 2018.
  • Trending
  • Latest
  • Most cited
  • The Future of Terrorism: The Practitioners’ View
  • Countering Radicalism in the North Caucasus
  • Armenia and the South Caucasus: A New Security Environment
  • The importance of the Council of Europe’s 24/7 Network of Contact Points on Foreign Terrorist Fighters
  • The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank
view all
Introduction to Program-based Defense Resource Management (7)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (5)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2019
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal