Two factor authentication using mobile phones, 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp.641-644, 2009. ,
DOI : 10.1109/AICCSA.2009.5069395
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.4890
The password thicket: technical and market failures in human authentication on the web, pp.1-10, 2010. ,
Electronic authentication guideline, 2008. ,
DOI : 10.6028/nist.sp.800-63v1.0
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2795
A Criteria-Based Evaluation Framework for Authentication Schemes in IMS, 2009 International Conference on Availability, Reliability and Security, pp.865-869, 2009. ,
DOI : 10.1109/ARES.2009.166
Secure Internet banking authentication, IEEE Security & Privacy Magazine, vol.4, issue.2, pp.21-29, 2006. ,
DOI : 10.1109/MSP.2006.50
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Financial Cryptography and Data Security, pp.88-103, 2007. ,
DOI : 10.1007/978-3-540-77366-5_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.3533
Identity management in mobile cellular networks and related applications, Information Security Technical Report, vol.9, issue.1, pp.77-85, 2004. ,
DOI : 10.1016/S1363-4127(04)00017-2
Strong authentication with mobile phone as security token, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp.777-782, 2009. ,
DOI : 10.1109/MOBHOC.2009.5336918
2-clickAuth Optical Challenge-Response Authentication, 2010 International Conference on Availability, Reliability and Security, pp.79-86, 2010. ,
DOI : 10.1109/ARES.2010.85
Secure web authentication with mobile phones, Proceedings of DIMACS Workshop on Usable Privacy and Security Software, 2004. ,
Password memorability and security: empirical results, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.25-31, 2004. ,
DOI : 10.1109/MSP.2004.81