M. Adham, A. Azodi, Y. Desmedt, and I. Karaolis, How to Attack Two-Factor Authentication Internet Banking, Financial Cryptography, 2013.
DOI : 10.1007/978-3-642-39884-1_27

M. H. Almeshekah, M. J. Atallah, and E. H. Spafford, Back Channels Can Be Useful! ??? Layering Authentication Channels to Provide Covert Communication, Security Protocols XXI, Lecture Notes in Computer Science, 2013.
DOI : 10.1007/978-3-642-41717-7_22

M. H. Almeshekah and E. H. Spafford, Planning and Integrating Deception into Computer Security Defenses, Proceedings of the 2014 workshop on New Security Paradigms Workshop, NSPW '14, 2014.
DOI : 10.1145/2683467.2683482

H. Chang and M. J. Atallah, Protecting Software Code by Guards, Security and privacy in digital rights management, pp.160-175, 2002.
DOI : 10.1007/3-540-47870-1_10

D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. Van-dijk et al., The Untrusted Computer Problem and Camera-Based Authentication, Pervasive Computing, pp.114-124, 2002.
DOI : 10.1007/3-540-45866-2_10

S. Drimer, S. J. Murdoch, and R. Anderson, Optimised to Fail: Card Readers for Online Banking, Financial Cryptography and Data Security, pp.184-200, 2009.
DOI : 10.1007/978-3-642-03549-4_11

I. Drokov, E. Punskaya, and E. Tahar, System and Method For Dynamic Multifactor Authentication, 2006.

N. Fazio and A. Nicolosi, Cryptographic accumulators: Definitions, constructions and applications

N. Harini and T. R. Padmanabhan, 2CAuth: A New Two Factor Authentication Scheme Using QR-Code, International Journal of Engineering and Technology, 2013.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

Y. Lee, J. Kim, W. Jeon, and D. Won, Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device, Information Technology Convergence , Secure and Trust Computing, and Data Management, pp.241-247, 2012.
DOI : 10.1007/978-94-007-5083-8_30

Y. S. Lee, N. H. Kim, H. Lim, H. Jo, and H. J. Lee, Online banking authentication system using mobile-OTP with QR-code, Computer Sciences and Convergence Information Technology (ICCIT) 5th International Conference on, pp.644-648, 2010.

S. Li, A. R. Sadeghi, S. Heisrath, R. Schmitz, and J. J. Ahmad, hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers, Financial Cryptography and Data Security, pp.235-249, 2012.
DOI : 10.1007/978-3-642-27576-0_19

K. Liao and W. Lee, A Novel User Authentication Scheme Based on QR-Code, Journal of Networks, vol.5, issue.8, pp.937-941, 2010.
DOI : 10.4304/jnw.5.8.937-941

M. Mimoso, Two-Factor Authentication No Cure-All for Twitter Security Woes

D. M. 'raihi, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen, RFC 4226 - HOTP: An HMAC-Based One-Time Password Algorithm, 2005.

D. M. 'raihi, S. Machani, M. Pei, and J. , RFC 6238 -TOTP: Time-Based One-Time Password Algorithm, 2011.

S. Mukhopadhyay and D. Argles, An Anti-Phishing mechanism for single sign-on based on QR-code, Information Society (i-Society), 2011 International Conference on, pp.505-508, 2011.

D. and P. Maestre, QRP: An improved secure authentication method using QR codes, 2012.

G. Starnberger, L. Froihofer, and K. M. Goeschka, QR-TAN: Secure Mobile Transaction Authentication, 2009 International Conference on Availability, Reliability and Security, pp.578-583, 2009.
DOI : 10.1109/ARES.2009.96