1. A. Hagalisletto and A. Riiber, Using the Mobile Phone in Two-Factor Authentication Encap white paper

H. Raddum, L. H. Nestås, and K. J. Hole, Security Analysis of Mobile Phones Used as OTP Generators, Reports in Informatics, vol.392, 1999.
DOI : 10.1007/978-3-642-12368-9_26

URL : https://hal.archives-ouvertes.fr/hal-01056074

A. Jøsang, B. Alfayyadh, T. Grandison, M. Alzomai, and J. Mcnamara, Security Usability Principles for Vulnerability Analysis and Risk Assessment, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.10-14, 2007.
DOI : 10.1109/ACSAC.2007.14

K. J. Hole, A. N. Klingsheim, L. Netland, Y. Espelid, T. Tjøstheim et al., Risk Assessment of a National Security Infrastructure, IEEE Security & Privacy Magazine, vol.7, issue.1, 2009.
DOI : 10.1109/MSP.2009.17