446
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Publish your conference poster on ScienceOpen Posters to carry on the conversation.

      All posters are assigned an Open Access CC BY 4.0 license, a Crossref DOI and are integrated with ORCID, ROR, FunderID and more for best discoverability.

      scite_
       
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Cryptography in Banking Sector

      Published
      research-article
        1 ,
      ScienceOpen Posters
      ScienceOpen
      Bank, cryptography
      Bookmark

            Abstract

            The development of cryptographic techniques has seen a lot of applications in the banking industry. In this blog we see some of the major cryptographic techniques which has been used extensively in the banking industry, for the implementation of data security norms and the fulfillment of compliance requirements.

            Content

            Author and article information

            Journal
            ScienceOpen Posters
            ScienceOpen
            18 November 2020
            Affiliations
            [1 ] Karunya University
            Author information
            https://orcid.org/0000-0002-1427-9781
            Article
            10.14293/S2199-1006.1.SOR-.PPND49G.v1
            4278d219-98ad-406f-a64b-9217cd179ec0

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 18 November 2020

            The data that support the findings of this study are available from https://www.nap.edu/read/25010/chapter/4#25 but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of https://www.nap.edu/read/25010/chapter/4#25.
            Computer science
            Bank,cryptography

            Comments

            Comment on this article