Review Article

Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service

Figure 5

A flowchart of the initial end-to-end encryption and extended end-to-end encryption.