Using the Mobile Phone in Two-Factor Authentication Encap white paper ,
Security Analysis of Mobile Phones Used as OTP Generators, Reports in Informatics, vol.392, 1999. ,
DOI : 10.1007/978-3-642-12368-9_26
URL : https://hal.archives-ouvertes.fr/hal-01056074
Security Usability Principles for Vulnerability Analysis and Risk Assessment, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.10-14, 2007. ,
DOI : 10.1109/ACSAC.2007.14
Risk Assessment of a National Security Infrastructure, IEEE Security & Privacy Magazine, vol.7, issue.1, 2009. ,
DOI : 10.1109/MSP.2009.17