An Extensive Resolution Of ATM Security Systems

被引:0
|
作者
Jacintha, V. M. E. [1 ]
Rani, Jamuna S. [1 ]
Beula, Glory J. [1 ]
Johnsly, Jeba J. [1 ]
机构
[1] Jeppiaar Maamallan Engn Coll, ECE Dept, Kanchipuram, Tamil Nadu, India
来源
2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM) | 2017年
关键词
Automatic teller machine; survey; ATM security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the present scenario, public pursuing a energetic and comfortable way of lifestyle, the ATM provide a pleasant advantage to public on losing their time in the bank for many hours[10]. At the same time, there are many ATM robberies are occurred, even if the CCTV cameras are placed in the ATM centers. The security risks are card cloning and ATM PIN release etc., automated Teller gadget security pursuits to shield towards the somatic and digital theft. To ditch the ATM fraudulent electronic transaction technique is used as a safeguard[9]. in order to avoid the ATM robberies maximum of the systems offers various forms of supervising options[9]. To improve the security various techniques are combines to give a better result. The purpose of this paper is to present a survey about different techniques used for ATM security purpose and about confrontations facing in it.
引用
收藏
页码:934 / 938
页数:5
相关论文
共 50 条
  • [21] A New Vision for ATM Security Management The Security Management Platform
    Porretti, Claudio
    Lahaije, Raoul
    Kolev, Denis
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 493 - 498
  • [22] ISDN security services - Merging ISDN and ATM security requirements
    Leitold, H
    Posch, KC
    Posch, R
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 21 - 35
  • [23] Resolution of extensive Janeway lesions
    Alameddine, Abdallah K.
    Binnall, Brian
    Alameddine, Ziad O.
    JOURNAL OF CARDIAC SURGERY, 2017, 32 (05) : 295 - 295
  • [24] Influence of ink and smoke ATM security systems on dactyloscopy and subsequent DNA analysis after detonation
    De Smet, Margot
    Ramaekers, Kato
    Verhoeven, Elke
    Vermeulen, Steve
    Bekaert, Bram
    FORENSIC SCIENCE INTERNATIONAL-GENETICS, 2021, 54
  • [25] Automation of conflict detection and resolution in ATM
    Winter, H
    AEROSPACE SCIENCE AND TECHNOLOGY, 2003, 7 (06) : 407 - 407
  • [26] TESTING ATM SYSTEMS
    RUIU, D
    IEEE SPECTRUM, 1994, 31 (06) : 25 - 27
  • [27] Validating a European ATM Security System Architecture
    Finke, Michael
    de Waard, Peter
    Recchilongo, Pietro
    Lahaije, Raoul
    Baumann, Ulrike
    2018 IEEE/AIAA 37TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2018, : 27 - 35
  • [28] A security protocol providing QoS in ATM networks
    Schlake, F
    Ruland, C
    ICCS 2002: 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2002, : 933 - 937
  • [29] Lip print recognition for security systems by multi-resolution architecture
    Kim, JO
    Lee, W
    Hwang, J
    Baik, KS
    Chung, CH
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (02): : 295 - 301
  • [30] Developing regulatory standards for the concept of security in online dispute resolution systems
    Abedi, Fahimeh
    Zeleznikow, John
    Brien, Chris
    COMPUTER LAW & SECURITY REVIEW, 2019, 35 (05)