F. Aloul, S. Zahidi, and W. El-hajj, Two factor authentication using mobile phones, 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp.641-644, 2009.
DOI : 10.1109/AICCSA.2009.5069395

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.4890

J. Bonneau and S. Preibusch, The password thicket: technical and market failures in human authentication on the web, pp.1-10, 2010.

W. E. Burr, D. F. Dodson, and W. T. Polk, Electronic authentication guideline, 2008.
DOI : 10.6028/nist.sp.800-63v1.0

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2795

C. Eliasson, M. Fiedler, and I. Jorstad, A Criteria-Based Evaluation Framework for Authentication Schemes in IMS, 2009 International Conference on Availability, Reliability and Security, pp.865-869, 2009.
DOI : 10.1109/ARES.2009.166

A. Hiltgen, T. Kramp, and T. Weigold, Secure Internet banking authentication, IEEE Security & Privacy Magazine, vol.4, issue.2, pp.21-29, 2006.
DOI : 10.1109/MSP.2006.50

M. Mannan and P. C. Van-oorschot, Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Financial Cryptography and Data Security, pp.88-103, 2007.
DOI : 10.1007/978-3-540-77366-5_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.3533

K. Rannenberg, Identity management in mobile cellular networks and related applications, Information Security Technical Report, vol.9, issue.1, pp.77-85, 2004.
DOI : 10.1016/S1363-4127(04)00017-2

D. Van-thanh, I. Jorstad, T. Jonvik, and D. Van-thuan, Strong authentication with mobile phone as security token, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp.777-782, 2009.
DOI : 10.1109/MOBHOC.2009.5336918

A. Vapen, D. Byers, and N. Shahmehri, 2-clickAuth Optical Challenge-Response Authentication, 2010 International Conference on Availability, Reliability and Security, pp.79-86, 2010.
DOI : 10.1109/ARES.2010.85

M. Wu, S. Garfinkel, and R. Miller, Secure web authentication with mobile phones, Proceedings of DIMACS Workshop on Usable Privacy and Security Software, 2004.

J. Yan, A. Blackwell, R. Anderson, and A. Grant, Password memorability and security: empirical results, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.25-31, 2004.
DOI : 10.1109/MSP.2004.81