J. Lach, Using Mobile Devices for User Authentication, Computer Networks, 17th Conference Proceedings. Volume 79 of Communications in Computer and Information Science, pp.263-268, 2010.
DOI : 10.1007/978-3-642-13861-4_27

V. Bertocci, G. Serack, and C. Baker, Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities, 2008.

M. Mercuri, Beginning Information Cards and CardSpace: From Novice to Professional . Apress, 2007.
DOI : 10.1007/978-1-4302-0204-2

H. S. Al-sinani, C. J. Mitchell, E. De-leeuw, S. Fischer-hübner, and L. Fritsch, Using CardSpace as a Password Manager, Proceedings of IFIP IDMAN 2010 ? the second IFIP Conference on Policies and Research in Identity Management IFIP Advances in Information and Communication Technology, pp.18-30, 2010.
DOI : 10.1007/978-3-642-17303-5_2

URL : https://hal.archives-ouvertes.fr/hal-01054403

H. S. Al-sinani, W. A. Alrodhan, and C. J. Mitchell, CardSpace-liberty integration for CardSpace users, Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST '10, pp.12-25, 2010.
DOI : 10.1145/1750389.1750392

M. B. Jones, A Guide to Using the Identity Selector Interoperability Profile V1.5 within Web Applications and Browsers. Microsoft Corporation, 2008.

M. B. Jones and M. Mcintosh, Identity Metasystem Interoperability Version 1.0 (IMI 1.0), OASIS Standard, 2009.

S. B. Guthery and M. J. Cronin, Mobile Application Development with SMS and SIM Toolkit, 2002.

L. Bodic and G. , Mobile Messaging Technologies and Services SMS, EMS and MMS, 2003.

H. S. Al-sinani and C. J. Mitchell, Implementing PassCard ? a CardSpace-based Password Manager, pp.2010-2025, 2010.
DOI : 10.1007/978-3-642-17303-5_2

J. Hart, K. Markantonakis, K. Mayes, S. I. Java, P. Samarati et al., Website Credential Storage and Two-Factor Web Authentication with a Java SIM, Proceedings, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, pp.229-236, 2010.
DOI : 10.1007/978-3-540-85886-7_28

URL : https://hal.archives-ouvertes.fr/hal-01056084

M. Wu, S. Garfinkel, and R. Miller, Secure web authentication with mobile phones, DIMACS Workshop on Usable Privacy and Security Systems, 2004.

R. Jammalamadaka, T. Van-der-horst, S. Mehrotra, K. Seamons, and N. Venkasubramanian, Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.57-66, 2006.
DOI : 10.1109/ACSAC.2006.23

A. Pashalidis and C. J. Mitchell, Impostor: a single sign-on system for use from untrusted devices., IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.2191-2195, 2004.
DOI : 10.1109/GLOCOM.2004.1378398

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5435

D. Florêncio and C. Herley, One-Time Password Access to Any Server without Changing the Server, Proceedings of the Information Security, 11th International Conference, pp.401-420, 2008.
DOI : 10.1007/978-3-540-85886-7_28

A. Luotonen, Web Proxy Servers, 1997.

F. Aloul, S. Zahidi, and W. El-hajj, Two factor authentication using mobile phones, 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp.641-644, 2009.
DOI : 10.1109/AICCSA.2009.5069395

M. Mannan and P. V. Oorschot, Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Lecture Notes in Computer Science, vol.4886, pp.88-103, 2007.
DOI : 10.1007/978-3-540-77366-5_11

A. Alqattan, N. Kaviani, P. Lewis, N. Pearson, and . Canada, A two-Factor Authentication System using Mobile Devices to Protect against Untrusted Public Computers, 2007.

M. Schuba, V. Gerstenberger, and P. Lahaije, Internet ID ? Flexible Re-use of Mobile Phone Authentication Security for Service Access, 2004.

I. Jørstad, D. Van-thuan, T. Jønvik, and D. Van-thanh, Bridging CardSpace and Liberty Alliance with SIM authentication, Proceedings of the 10th International Conference on Intelligence in Next Generation Networks, pp.8-13, 2007.

R. Abdelhameed, S. Khatun, B. Ali, and A. Ramli, Authentication model based bluetooth-enabled mobile phone, Journal of Computer Science, vol.1, issue.2, pp.200-203, 2005.