ACKNOWLEDGEMENT
The author is thanking his teammates for their constructive comment and additional flavour of cherished
suggestion for the earlier draft paper, part of the work in this survey was carried out while the author was
working for Faculty Of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah
Conflict of Interest
Authors declare that there is no conflict of interests regarding the publication of the paper.
Author Contribution
The contributions of all authors must be described in the following manner:
The authors confirm contribution to the paper as follows: study conception and design: A.Fairuzullah,
A.Noraziah; data collection: A.Fairuzullah; analysis and interpretation of results: A.Fairuzullah,
A.Noraziah; draft manuscript preparation: A.Fairuzullah, A.Noraziah. All authors reviewed the results and
approved the final version of the manuscript.
REFERENCES
1. Ahuja, B., Prabha, C., & Garg, G. (2025). Emerging Technologies in E-Commerce Security. Strategic
Innovations of AI and ML for E-Commerce Data Security, 235-260.
2. Arele, A., & Sejwar, V. (2017). A Survey on E-Payment using Quantum and Visual Cryptography.
International Journal of Advanced Research in Computer Science, 8(5).
3. Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review.
International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.
4. Chen, X.-B., Sun, Y.-R., Xu, G., & Yang, Y.-X. (2019). Quantum homomorphic encryption scheme
with flexible number of evaluator based on (k, n)-threshold quantum state sharing. Information
Sciences, 501, 172-181.
5. Chen, X., Wang, B., & Li, H. (2024). A privacy-preserving multi-factor authentication scheme for
cloud-assisted IoMT with post-quantum security. Journal of Information Security and Applications, 81,
103708.
6. Choi, M., Oh, S., Kim, I., Heo, J., & Kim, H. (2024). Extracting Payment Tokens Out of Sounds
Produced by Magnetic Field Fluctuations. IEEE Transactions on Mobile Computing, 23(9), 8803-8821.
doi:10.1109/TMC.2024.3359266
7. Choi, M., Oh, S., Kim, I., & Kim, H. (2022). MagSnoop: listening to sounds induced by magnetic field
fluctuations to infer mobile payment tokens. Paper presented at the Proceedings of the 20th Annual
International Conference on Mobile Systems, Applications and Services.
8. Das, D., & Das, A. (2024). Blockchain-Enabled Distributed Payment Card Tokenization System. Paper
presented at the 2024 IEEE 5th India Council International Subsections Conference (INDISCON).
9. G A, S., Prabha, R., Avudainayaki, R., Sundaram, S., & Nithyashri, J. (2024). Advanced Mathematical
Application of Cryptographic Protocols in Distributed Ledger Technologies and Digital Currency
Systems.
10. Guan, Y., & Tick, A. (2024). Literature Review on Security of Personal Information in Electronic
Payments. Paper presented at the 2024 IEEE 18th International Symposium on Applied Computational
Intelligence and Informatics (SACI).
11. Li Mo, Chen Feiliang, Li Qian, Zhang Lijun, Wang Pidong, Yao Yao, & Jian, Z. (2018). Quantum
authentication method of triple security mechanism.
12. Lim, N.-H., Choi, J.-W., Kang, M.-S., Yang, H.-J., & Han, S.-W. (2023). Quantum authentication
method based on key-controlled maximally mixed quantum state encryption. EPJ Quantum
Technology, 10(1), 1-19.
13. Lukas, N., Salem, A., Sim, R., Tople, S., Wutschitz, L., & Zanella-Béguelin, S. (2023). Analyzing
leakage of personally identifiable information in language models. 2023 IEEE Symposium on Security
and Privacy (SP), 346-363.