Upload
dinhxuyen
View
233
Download
0
Embed Size (px)
Citation preview
Accepted Articles for Authentication Schemes and
Methods: a Systematic Literature Review
Acceptance Topic 1 (AT1): Authentication Schemes
1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band Authentication Using Image-Based One Time Password in
the Cloud Environment. International Journal of Security and Its Applications (IJSIA) 9, 35-46 (2015)
2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level approach to EEG based human authentication using
eye blinking. Pattern Recognition Letters (2015)
3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A comparative approach between cepstral features for
human authentication using heart sounds. Signal, Image and Video Processing 10, 843-851 (2016)
4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: User authentication through biometric
sensors and decision fusion. In: 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013.
(2013)
5. Adida, B.: EmID: Web authentication by email address. In: Proceedings of Web. (2008)
6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active
authentication on smart devices. Multimedia Tools and Applications 1-19 (2016)
7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical passwords for augmenting, not replacing, text passwords.
Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New Orleans, Louisiana, USA
(2013)
8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making Random Passwords Memorable: Leveraging Users'
Cognitive Ability Through Multiple Cues. Proceedings of the 33rd Annual ACM Conference on Human Factors in
Computing Systems. ACM, Seoul, Republic of Korea (2015)
9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual
authentication and key exchange. In: 2013 8th International Conference for Internet Technology and Secured
Transactions, ICITST 2013, pp. 369-374. (2013)
10. Ali, A.M.: Zero footprint secure internet authentication using network smart card. Lecture Notes in Computer
Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3928
LNCS, pp. 91-104 (2006)
11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke Biometric Systems for User Authentication. Journal of
Signal Processing Systems 1-16 (2016)
12. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system
(IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58, 108-116 (2013)
13. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: IPAS: Implicit password authentication system. In: IEEE
Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pp.
430-435. IEEE, (2011)
14. Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security
(WorldCIS), pp. 223-225. (2011)
15. Alrawais, A., Alhothaily, A., Cheng, X.: Secure authentication scheme using dual channels in rogue access point
environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), vol. 8491, pp. 554-563 (2014)
16. Alzomai, M., Alfayyadh, B., Jøsang, A.: Display security for online transactions: SMS-based authentication scheme.
In: 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. (2010)
17. Alzomai, M., Jøsang, A., McCullagh, A., Foo, E.: Strengthening SMS-based authentication through usability. In:
Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA
2008, pp. 683-688. (2008)
18. Amin, R., Biswas, G.P.: A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical
Server Usable in TMIS. Journal of Medical Systems 39, 1-17 (2015)
19. Amin, R., Biswas, G.P.: Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using
Smart Card. Arabian Journal for Science and Engineering 40, 3135-3149 (2015)
20. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: An Efficient and Practical Smart Card Based
Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical
Systems 39, 1-18 (2015)
21. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I., Cameron, D., Fischer, M.H.: VIP: a visual approach to user
authentication. Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, Trento, Italy (2002)
22. Annapurani, K., Sadiq, M.A.K., Malathy, C.: Fusion of shape of the ear and tragus – A unique feature extraction
method for ear authentication system. Expert Systems with Applications 42, 649-656 (2015)
23. Antal, M., Szabó, L.Z.: Biometric Authentication Based on Touchscreen Swipe Patterns. Procedia Technology 22,
862-869 (2016)
24. Arif, A., Pahud, M., Hinckley, K., Buxton, W.: A tap and gesture hybrid method for authenticating smartphone users.
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services.
ACM, Munich, Germany (2013)
25. Arthur Evans, Jr., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring secrecy in the computer.
Commun. ACM 17, 437-442 (1974)
26. Assaad, F.S., Serpen, G.: Transformation based Score Fusion Algorithm for Multi-modal Biometric User
Authentication through Ensemble Classification. Procedia Computer Science 61, 410-415 (2015)
27. Atallah, M.J., Frikken, K.B., Goodrich, M.T., Tamassia, R.: Secure biometric authentication for weak computational
devices. In: Lecture Notes in Computer Science, pp. 357-371. (2005)
28. Awasthi, A.K., Lal, S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE
Transactions on Consumer Electronics 49, 1246-1248 (2003)
29. Awasthi, A.K., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Transactions on
Consumer Electronics 50, 583-586 (2004)
30. Awasthi, A.K., Srivastava, K.: A Biometric Authentication Scheme for Telecare Medicine Information Systems with
Nonce. Journal of Medical Systems 37, 1-4 (2013)
31. Aykut, M., Ekinci, M.: Developing a contactless palmprint authentication system by introducing a novel ROI
extraction method. Image and Vision Computing 40, 65-74 (2015)
32. Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication.
Fuzzy Optimization and Decision Making 7, 243-256 (2008)
33. Babu, B.S., Venkataram, P.: An authentication scheme for personalized mobile multimedia services: A cognitive
agents based approach. In: Proceedings of Future Generation Communication and Networking, FGCN 2007, pp. 167-
172. (2007)
34. Babu, B.S., Venkataram, P.: Cognitive agents based authentication & privacy scheme for mobile transactions
(CABAPS). Computer Communications 31, 4060-4071 (2008)
35. Bai, Z., Hatzinakos, D.: LBP-based biometric hashing scheme for human authentication. In: 11th International
Conference on Control, Automation, Robotics and Vision, ICARCV 2010, pp. 1842-1847. (2010)
36. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral
biometrics. Computers & Security 43, 77-89 (2014)
37. Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information
Conference (SAI), 2014, pp. 601-606. (2014)
38. Bandyopadhyay, S.K., Bhattacharyya, D., Das, P.: User authentication by Secured Graphical Password
Implementation. In: Information and Telecommunication Technologies, 2008. APSITT. 7th Asia-Pacific Symposium
on, pp. 7-12. (2008)
39. Banerjee, P.K., Chandra, J.K., Datta, A.K.: Feature based optimal trade-off parameter selection of frequency domain
correlation filter for real time face authentication. Proceedings of the 2011 International Conference on
Communication, Computing & Security. ACM, Rourkela, Odisha, India (2011)
40. Bansal, M., Hanmandlu, M., Kumar, P.: IRIS based authentication using local principal independent components.
Optik - International Journal for Light and Electron Optics 127, 4808-4814 (2016)
41. Bashir, M., Scharfenberg, G., Kempf, J.: Person Authentication by Handwriting in air using a Biometric Smart Pen
Device. BIOSIG 191, 219-226 (2011)
42. Bennet, D., Arumugaperumal, S.: Fingerprint based multi-server authentication system. In: International Conference
on Electronics Computer Technology (ICECT), 2011 3rd, pp. 115-119. (2011)
43. Best, D.S., Duchowski, A.T.: A rotary dial for gaze-based PIN entry. Proceedings of the Ninth Biennial ACM
Symposium on Eye Tracking Research & Applications. ACM, Charleston, South Carolina (2016)
44. Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework.
Journal of Medical Informatics & Technologies 23, (2014)
45. Bianchi, A., Oakley, I., Kwon, D.S.: The secure haptic keypad: a tactile password system. Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta, Georgia, USA (2010)
46. Bianchi, A., Oakley, I., Kwon, D.S.: Using mobile device screens for authentication. Proceedings of the 23rd
Australian Computer-Human Interaction Conference. ACM, Canberra, Australia (2011)
47. Bicakci, K., Oorschot, P.C.v.: A multi-word password proposal (gridWord) and exploring questions about science in
security research and usable security evaluation. Proceedings of the 2011 workshop on New security paradigms
workshop. ACM, Marin County, California, USA (2011)
48. Binu, S., Misbahuddin, M., Raj, P.: A Single Sign on based secure remote user authentication scheme for Multi-
Server Environments. In: International Conference on Computer and Communications Technologies (ICCCT), 2014,
pp. 1-6. (2014)
49. Borisov, A.: A Novel Approach for User Authentication to Industrial Components Using QR Codes. In: Computer
Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, pp. 61-66. IEEE, (2015)
50. Boudguiga, A., Laurent, M.: An ID-based authentication scheme for the IEEE 802.11s mesh network. In: 2010 IEEE
6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010,
pp. 256-263. (2010)
51. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know.
Proceedings of the 13th ACM conference on Computer and communications security. ACM, Alexandria, Virginia,
USA (2006)
52. Brown, M., Doswell, F.R.: Using passtones instead of passwords. Proceedings of the 48th Annual Southeast
Regional Conference. ACM, Oxford, Mississippi (2010)
53. Bulling, A., Alt, F., Schmidt, A.: Increasing the security of gaze-based cued-recall graphical passwords using
saliency masks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin,
Texas, USA (2012)
54. Cagalj, M., Perkovic, T., Bugaric, M.: Timing attacks on cognitive authentication schemes. IEEE Transactions on
Information Forensics and Security 10, 584-596 (2015)
55. Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and improvements to an RIFD mutual authentication protocol and its
extensions. Proceedings of the second ACM conference on Wireless network security. ACM, Zurich, Switzerland
(2009)
56. Carter, N.J.: Graphical Passwords for Older Computer Users. Adjunct Proceedings of the 28th Annual ACM
Symposium on User Interface Software & Technology. ACM, Daegu, Kyungpook, Republic of Korea (2015)
57. Catuogno, L., Galdi, C.: On user authentication by means of video events recognition. Journal of Ambient
Intelligence and Humanized Computing 5, 909-918 (2014)
58. Chang, C.-C., Hsueh, W.-Y., Cheng, T.-F.: A Dynamic User Authentication and Key Agreement Scheme for
Heterogeneous Wireless Sensor Networks. Wireless Personal Communications 89, 447-465 (2016)
59. Chang, Y.-F., Chang, C.-C., Kuo, J.-Y.: A secure one-time password authentication scheme using smart cards
without limiting login times. SIGOPS Oper. Syst. Rev. 38, 80-90 (2004)
60. Chatzis, V., Bors, A.G., Pitas, I.: Multimodal decision-level fusion for person authentication. IEEE transactions on
systems, man, and cybernetics-part a: systems and humans 29, 674-680 (1999)
61. Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K.: An Improved and Secure Biometric Authentication Scheme
for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. Journal of Medical Systems 39,
1-12 (2015)
62. Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks.
Multimedia Tools and Applications 1-21 (2016)
63. Chelliah, B., Geetha, S.: Enhancing E-Payment Security through Biometric Based Personal Authentication Using
Steganography Scheme - B-PASS. Communications in Computer and Information Science, vol. 420 CCIS, pp. 461-
472 (2014)
64. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme.
International Journal of Communication Systems 27, 377-389 (2014)
65. Chen, C.-L., Deng, Y.-Y.: Conformation of EPC Class 1 Generation 2 standards RFID system with mutual
authentication and privacy protection. Engineering Applications of Artificial Intelligence 22, 1284-1291 (2009)
66. Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system
for smartphones. Proceedings of the 12th annual international conference on Mobile systems, applications, and
services. ACM, Bretton Woods, New Hampshire, USA (2014)
67. Chen, T., Huang, S.H.: Tree parity machine-based one-time password authentication schemes. In: Proceedings of the
International Joint Conference on Neural Networks, pp. 257-261. (2008)
68. Chen, T.-Y., Lee, C.-C., Hwang, M.-S., Jan, J.-K.: Towards secure and efficient user authentication scheme using
smart card for multi-server environments. The Journal of Supercomputing 66, 1008-1032 (2013)
69. Chen, Y., Chou, J.-S., Sun, H.-M.: A novel mutual authentication scheme based on quadratic residues for RFID
systems. Computer Networks 52, 2373-2380 (2008)
70. Chen, Y., Chou, J.-S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic
Commerce Research 15, 97-120 (2015)
71. Chen, Y., Shu, J., Yang, F., Chen, H.: User authentication and data cryptograph system based on biometric key for
wireless sensor networks. Journal of Computational Information Systems 9, 3949-3959 (2013)
72. Cheng, F.: A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password
Token. In: 2010 IEEE 34th Annual Computer Software and Applications Conference, pp. 147-154. (2010)
73. Cheng, F.: Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption
Algorithm. Mobile Networks and Applications 16, 304-336 (2011)
74. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication scheme for remote user login and
verification. International Journal of Innovative Computing, Information and Control 8, 5499-5511 (2012)
75. Cheul Shin, K., Jong Oh, K.: Smartcard-based remote authentication scheme preserving user anonymity.
International Journal of Information Processing and Management 4, 10-18 (2013)
76. Chiang, H.-Y., Chiasson, S.: Improving user authentication on mobile devices: a touchscreen graphical password.
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services.
ACM, Munich, Germany (2013)
77. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International
Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp. 245-
248. IEEE, (2005)
78. Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: A hash-based
radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with
Applications 69, 58-65 (2015)
79. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication
protocol using a secret value. Computer Communications 34, 391-397 (2011)
80. Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code.
In: Proceedings - 2011 International Conference on Mobile IT-Convergence, ICMIC 2011, pp. 109-113. (2011)
81. Choi, S., Zage, D.: Addressing insider threat using “where you are” as fourth factor authentication. In: Security
Technology (ICCST), 2012 IEEE International Carnahan Conference on, pp. 147-153. (2012)
82. Chou, J.-S.: An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of
Supercomputing 70, 75-94 (2014)
83. Chowdhury, S., Poet, R., Mackenzie, L.: Passhint: memorable and secure authentication. Proceedings of the 32nd
annual ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014)
84. Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.: Outsourceable two-party privacy-preserving biometric
authentication. Proceedings of the 9th ACM symposium on Information, computer and communications security.
ACM, Kyoto, Japan (2014)
85. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a
smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information,
Computer and Communications Security, pp. 249-259. ACM, (2011)
86. Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication.
Computers & Security 39, Part B, 127-136 (2013)
87. Dabbah, M., Woo, W., Dlay, S.: Secure authentication for face recognition. In: Computational Intelligence in Image
and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, pp. 121-126. IEEE, (2007)
88. Das, A.K., Bruhadeshwar, B.: An Improved and Effective Secure Password-Based Authentication and Key
Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. Journal of Medical Systems
37, 1-17 (2013)
89. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for
hierarchical wireless sensor networks. Journal of Network and Computer Applications 35, 1646-1656 (2012)
90. Das, R.K., Jelil, S., Mahadeva Prasanna, S.R.: Development of Multi-Level Speech based Person Authentication
System. Journal of Signal Processing Systems 1-13 (2016)
91. David, D.B., Rajappa, M., Karupuswamy, T., Iyer, S.P.: A Dynamic-Identity Based Multimedia Server Client
Authentication Scheme for Tele-Care Multimedia Medical Information System. Wireless Personal Communications
85, 241-261 (2015)
92. De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN: securing PIN entry through indirect input. In: Proceedings
of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103-1106. ACM, (2010)
93. De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: FIRME: Face and Iris Recognition for Mobile Engagement. Image
and Vision Computing 32, 1161-1172 (2014)
94. De Marsico, M., Nappi, M., Riccio, D.: Face authentication with undercontrolled pose and illumination. Signal,
Image and Video Processing 5, 401-413 (2011)
95. Denning, T., Bowers, K., Dijk, M.v., Juels, A.: Exploring implicit memory for painless password recovery.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada
(2011)
96. Dhamija, R., Perrig, A.: Deja Vu-A User Study: Using Images for Authentication. In: USENIX Security Symposium,
pp. 4-4. (2000)
97. Dhamija, R.: Hash visualization in user authentication. CHI '00 Extended Abstracts on Human Factors in Computing
Systems. ACM, The Hague, The Netherlands (2000)
98. Dhondge, K., Choi, B.Y., Song, S., Park, H.: Optical Wireless authentication for smart devices using an onboard
ambient light sensor. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN),
pp. 1-8. (2014)
99. Ding, Y., Zhuang, D., Wang, K.: A study of hand vein recognition method. In: IEEE International Conference
Mechatronics and Automation, 2005, pp. 2106-2110. IEEE, (2005)
100. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in
mobile RFID systems. Ad Hoc Networks 11, 383-396 (2013)
101. Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A minimum disclosure approach to authentication and privacy
in RFID systems. Computer Networks 56, 3401-3416 (2012)
102. Drosou, A., Ioannidis, D., Moustakas, K., Tzovaras, D.: Spatiotemporal analysis of human activities for biometric
authentication. Computer Vision and Image Understanding 116, 411-421 (2012)
103. Drosou, A., Ioannidis, D., Tzovaras, D., Moustakas, K., Petrou, M.: Activity related authentication using prehension
biometrics. Pattern Recognition 48, 1743-1759 (2015)
104. Drosou, A., Moustakas, K., Tzovaras, D.: Event-based unobtrusive authentication using multi-view image sequences.
Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in
imagery streams. ACM, Firenze, Italy (2010)
105. Duc, B., Maître, G., Fischer, S., Bigün, J.: Person authentication by fusing face and speech information. In:
International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 311-318. Springer, (1997)
106. Dutta, R.: Converting group key agreement protocol into password-based setting - Case study. Journal of Computers
2, 26-33 (2007)
107. Emam, A.H.M.: Additional authentication and authorization using registered email-ID for cloud computing.
International Journal of Soft Computing and Engineering 3, 110-113 (2013)
108. English, R., Poet, R.: Towards a metric for recognition-based graphical password security. Proceedings - 2011 5th
International Conference on Network and System Security, NSS 2011 239-243 (2011)
109. Everts, M., Hoepman, J.-H., Siljee, J.: UbiKiMa: ubiquitous authentication using a smartphone, migrating from
passwords to strong cryptography. Proceedings of the 2013 ACM workshop on Digital identity management. ACM,
Berlin, Germany (2013)
110. Fahmi, P.A., Kodirov, E., Choi, D.-J., Lee, G.-S., Azli, A.M.F., Sayeed, S.: Implicit authentication based on ear
shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man,
and Cybernetics (SMC), pp. 2272-2276. IEEE, (2012)
111. Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using
encrypted biometrics. Proceedings of the 12th ACM workshop on Multimedia and security. ACM, Roma, Italy
(2010)
112. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security
24, 619-628 (2005)
113. Fan, J.W., Chan, C.W., Chang, Y.F.: A random increasing sequence hash chain and smart card-based remote user
authentication scheme. In: ICICS 2013 - Conference Guide of the 9th International Conference on Information,
Communications and Signal Processing. (2013)
114. Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y.: An ultra-lightweight RFID authentication scheme for mobile
commerce. Peer-to-Peer Networking and Applications 1-9 (2016)
115. Fan, R., He, D.-j., Pan, X.-z., Ping, L.-d.: An efficient and DoS-resistant user authentication scheme for two-tiered
wireless sensor networks. Journal of Zhejiang University SCIENCE C 12, 550-560 (2011)
116. Fan, Y.T., Su, G.P.: Design of two-way one-time-password authentication scheme based on true random numbers. In:
2nd International Workshop on Computer Science and Engineering, WCSE 2009, pp. 11-14. (2009)
117. Farash, M.S., Kumari, S., Bakhtiari, M.: Cryptanalysis and improvement of a robust smart card secured
authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications 75, 4485-4504
(2016)
118. Farash, M.S.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic
curve cryptography. The Journal of Supercomputing 70, 987-1001 (2014)
119. Flior, E., Kowalski, K.: Continuous biometric user authentication in online examinations. In: ITNG2010 - 7th
International Conference on Information Technology: New Generations, pp. 488-492. (2010)
120. Fong, S., Zhuang, Y., Fister, I.: A biometric authentication model using hand gesture images. BioMedical
Engineering OnLine 12, 1-18 (2013)
121. Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical
passwords. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta,
Georgia, USA (2010)
122. Frankel, A.D., Maheswaran, M.: Feasibility of a socially aware authentication scheme. In: 2009 6th IEEE Consumer
Communications and Networking Conference, CCNC 2009. (2009)
123. Fridman, L., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision
fusion for continuous authentication. Computers & Electrical Engineering 41, 142-156 (2015)
124. Gafurov, D., Bours, P., Snekkenes, E.: User authentication based on foot motion. Signal, Image and Video
Processing 5, 457-467 (2011)
125. Giot, R., El-Abed, M., Hemery, B., Rosenberger, C.: Unconstrained keystroke dynamics authentication with shared
secret. Computers & Security 30, 427-445 (2011)
126. Gnanaraj, J.W.K., Ezra, K., Rajsingh, E.B.: Smart card based time efficient authentication scheme for global grid
computing. Human-centric Computing and Information Sciences 3, 1-14 (2013)
127. Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. CHI '02 Extended Abstracts on
Human Factors in Computing Systems. ACM, Minneapolis, Minnesota, USA (2002)
128. Gong, L., Pan, J., Liu, B., Zhao, S.: A novel one-time password mutual authentication scheme on sharing renewed
finite random sub-passwords. Journal of Computer and System Sciences 79, 122-130 (2013)
129. Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of
the mobile user in global mobility networks. Journal of Network and Computer Applications 62, 1-8 (2016)
130. Gope, P., Hwang, T.: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User
Anonymity in Global Mobile Networks. Wireless Personal Communications 82, 2231-2245 (2015)
131. Goutham, R.A., Kim, D.S., Yoo, K.Y.: Implicit graphical password mutual authentication using mirror-image
encryption. In: Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, pp. 218-223.
(2014)
132. Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement
protocol on ECC using smart cards. Proceedings of the 30th Annual ACM Symposium on Applied Computing.
ACM, Salamanca, Spain (2015)
133. Grover, J., Hanmandlu, M.: Hybrid fusion of score level and adaptive fuzzy decision level fusions for the finger-
knuckle-print based authentication. Applied Soft Computing Journal 31, 1-13 (2015)
134. Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through
hand gesture recognition. International Journal of Information Security 11, 65-83 (2012)
135. Gugenheimer, J., Luca, A.D., Hess, H., Karg, S., Wolf, D., Rukzio, E.: ColorSnakes: Using Colored Decoys to
Secure Authentication in Sensitive Contexts. Proceedings of the 17th International Conference on Human-Computer
Interaction with Mobile Devices and Services. ACM, Copenhagen, Denmark (2015)
136. Gugenheimer, J., Schaub, F., Neiswander, G.M., Guneratne, E., Weber, M.: User Authentication for Rotary Knob
Controlled In-car Applications. Proceedings of the 6th International Conference on Automotive User Interfaces and
Interactive Vehicular Applications. ACM, Seattle, WA, USA (2014)
137. Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: An Improved Biometrics-Based Authentication Scheme for Telecare
Medical Information Systems. Journal of Medical Systems 39, 1-10 (2015)
138. Gupta, P., Gupta, P.: Multi-modal fusion of palm-dorsa vein pattern for accurate personal authentication.
Knowledge-Based Systems 81, 117-130 (2015)
139. Gupta, P., Srivastava, S., Gupta, P.: An accurate infrared hand geometry and vein pattern based authentication
system. Knowledge-Based Systems 103, 143-155 (2016)
140. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., Fu, H.: MAPS: A Multi-Dimensional Password Scheme for
Mobile Authentication. Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces.
ACM, Madeira, Portugal (2015)
141. Gurav, S.M., Gawade, L.S., Rane, P.K., Khochare, N.R.: Graphical password authentication: Cloud securing scheme.
In: Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies,
ICESC 2014, pp. 479-483. (2014)
142. Gurung, B., Prasad, P.W.C., Alsadoon, A., Elchouemi, A.: Enhanced Virtual Password Authentication Scheme
Resistant to Shoulder Surfing. In: 2015 Second International Conference on Soft Computing and Machine
Intelligence (ISCMI), pp. 134-139. (2015)
143. Gy, odor, Szendi, t., Imre, n.: Elliptic curve cryptography based authentication protocol for small computational
capacity RFID systems. Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile
networks. ACM, Bodrum, Turkey (2010)
144. Habib, K., Torjusen, A., Leister, W.: A novel authentication framework based on bio-metric and radio fingerprinting
for the IoT in eHealth. In: Proceedings of International Conference on Smart Systems, Devices and Technologies
(SMART), pp. 32-37. (2014)
145. Hafizul Islam, S.K., Biswas, G.P.: Design of improved password authentication and update scheme based on elliptic
curve cryptography. Mathematical and Computer Modelling 57, 2703-2717 (2013)
146. Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a security token for unified authentication. In: 2007 Second
International Conference on Systems and Networks Communications (ICSNC 2007), pp. 68-68. IEEE, (2007)
147. Hammouri, G., Öztürk, E., Sunar, B.: A tamper-proof and lightweight authentication scheme. Pervasive and Mobile
Computing 4, 807-818 (2008)
148. Hang, A., Luca, A.D., Hussmann, H.: I Know What You Did Last Week! Do You?: Dynamic Security Questions for
Fallback Authentication on Smartphones. Proceedings of the 33rd Annual ACM Conference on Human Factors in
Computing Systems. ACM, Seoul, Republic of Korea (2015)
149. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A Chaotic Map-based Authentication Scheme for Telecare Medicine
Information Systems. Journal of Medical Systems 37, 1-7 (2013)
150. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java
SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010)
151. He, D., Chen, J., Chen, Y.: A secure mutual authentication scheme for session initiation protocol using elliptic curve
cryptography. Security and Communication Networks 5, 1423-1429 (2012)
152. He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement
scheme with pseudo identity for wireless sensor networks. Information Sciences 321, 263-277 (2015)
153. He, D., Wang, D.: Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Systems
Journal 9, 816-823 (2015)
154. Herzberg, A., Margulies, R.: My authentication album: Adaptive images-based login mechanism. In: IFIP
International Information Security Conference, pp. 315-326. Springer, (2012)
155. Hintze, D., Findling, R.D., Muaaz, M., Koch, E., Ren, Mayrhofer: Cormorant: towards continuous risk-aware multi-
modal cross-device authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on
Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable
Computers. ACM, Osaka, Japan (2015)
156. Hoang, T., Choi, D., Nguyen, T.: Gait authentication on mobile phone using biometric cryptosystem and fuzzy
commitment scheme. International Journal of Information Security 14, 549-560 (2015)
157. Hocquet, S., Ramel, J.-Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. In: Fourth IEEE
Workshop on Automatic Identification Advanced Technologies (AutoID'05), pp. 224-229. IEEE, (2005)
158. Hong, F., Wei, M., You, S., Feng, Y., Guo, Z.: Waving Authentication: Your Smartphone Authenticate You on
Motion Gesture. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in
Computing Systems. ACM, Seoul, Republic of Korea (2015)
159. Hong, S.: Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking
Techniques 1-7 (2015)
160. Hsieh, C.-Y., Lin, W.-Y.: Video-based human action and hand gesture recognition by fusing factored matrices of
dual tensors. Multimedia Tools and Applications 1-20 (2016)
161. Hsieh, W.B., Leu, J.S.: Design of a time and location based One-Time Password authentication scheme. In: IWCMC
2011 - 7th International Wireless Communications and Mobile Computing Conference, pp. 201-206. (2011)
162. Hu, L.-l., Niu, X.-x., Yang, Y.-x.: Weaknesses and improvements of a remote user authentication scheme using smart
cards. The Journal of China Universities of Posts and Telecommunications 14, 91-94 (2007)
163. Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein authentication based on wide line detector and pattern
normalization. In: International Conference on Pattern Recognition (ICPR), 2010 20th, pp. 1269-1272. IEEE, (2010)
164. Huang, H.F., Chang, H.W., Yu, P.K.: Enhancement of timestamp-based user authentication scheme with smart card.
International Journal of Network Security 16, 463-467 (2014)
165. Huang, Y., Huang, Z., Zhao, H., Lai, X.: A new One-time Password Method. IERI Procedia 4, 32-37 (2013)
166. Huang, Y.L., Lu, P.H., Tygar, J.D., Joseph, A.D.: OSNP: Secure wireless authentication protocol using one-time key.
Computers & Security 28, 803-815 (2009)
167. Hussain, A., Bhuiyan, A., Mian, A., Ramamohanarao, K.: Biometric Security Application for Person Authentication
Using Retinal Vessel Feature. In: International Conference on Digital Image Computing: Techniques and
Applications (DICTA), 2013, pp. 1-8. (2013)
168. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on
Communications E85-B, 823-825 (2002)
169. Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Transactions on
Consumer Electronics 46, 28-30 (2000)
170. Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. International
Journal of Computer Mathematics 70, 657-666 (1999)
171. Hwang, S.-s., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers & Security
28, 85-93 (2009)
172. Hwang, S.-s., Lee, H.-j., Cho, S.: Improving authentication accuracy using artificial rhythms and cues for keystroke
dynamics-based authentication. Expert Systems with Applications 36, 10649-10656 (2009)
173. Imtiaz, H., Fattah, S.A.: A face recognition scheme using wavelet-based local features. In: Computers & Informatics
(ISCI), 2011 IEEE Symposium on, pp. 313-316. (2011)
174. Imtiaz, H., Fattah, S.A.: A wavelet-domain local feature selection scheme for face recognition. In: International
Conference on Communications and Signal Processing (ICCSP), 2011, pp. 448-451. (2011)
175. Islam, M., Hasan, M.M., Farhad, M.M., Tanni, T.R.: Human authentication process using finger knuckle surface with
artificial Neural Networks based on a hybrid feature selection method. In: Proceeding of the 15th International
Conference on Computer and Information Technology, ICCIT 2012, pp. 61-64. (2012)
176. Islam, M.S.: Heartbeat biometrics for remote authentication using sensor embedded computing devices. International
Journal of Distributed Sensor Networks 2015, (2015)
177. Islam, S.K.H., Biswas, G.P.: Improved remote login scheme based on ECC. In: International Conference on Recent
Trends in Information Technology (ICRTIT), 2011, pp. 1221-1226. (2011)
178. Islam, S.K.H., Khan, M.K., Obaidat, M.S., Muhaya, F.T.B.: Provably Secure and Anonymous Password
Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wireless
Personal Communications 84, 2013-2034 (2015)
179. Jagadiswary, D., Saraswady, D.: Biometric Authentication Using Fused Multimodal Biometric. Procedia Computer
Science 85, 109-116 (2016)
180. Jain, A., Hong, L., Kulkarni, Y.: A multimodal biometric system using fingerprint, face and speech. In: Proceedings
of 2nd Int'l Conference on Audio-and Video-based Biometric Person Authentication, Washington DC, pp. 182-187.
(1999)
181. Jain, A., Kanhangad, V.: Exploring orientation and accelerometer sensor data for personal authentication in
smartphones using touchscreen gestures. Pattern Recognition Letters 68, Part 2, 351-360 (2015)
182. Jakobsson, M., Yang, L., Wetzel, S.: Quantifying the security of preference-based authentication. Proceedings of the
4th ACM workshop on Digital identity management. ACM, Alexandria, Virginia, USA (2008)
183. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R.: Graphical password authentication scheme for
embedded platform. Journal of Artificial Intelligence 7, 161-171 (2014)
184. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications.
International Journal of Security and its Applications 7, 1-16 (2013)
185. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home
networks. In: Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, pp. 294-294.
IEEE, (2008)
186. Jiang, L., Li, X., Cheng, L.L., Guo, D.: Identity authentication scheme of cloud storage for user anonymity via USB
token. In: Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification, ASID.
(2013)
187. Jiang, P., Wen, Q., Li, W., Jin, Z., Zhang, H.: An anonymous and efficient remote biometrics user authentication
scheme in a multi server environment. Frontiers of Computer Science 9, 142-156 (2015)
188. Jiang, Q., Li, G.S., Ma, J.F.: Security flaws and improvement of an ID-based wireless authentication scheme with
anonymity. Tongxin Xuebao/Journal on Communications 31, 209-216 (2010)
189. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service
in global mobility networks. Wireless Personal Communications 68, 1477-1491 (2013)
190. Jiang, Q., Ma, J., Ma, Z., Li, G.: A Privacy Enhanced Authentication Scheme for Telecare Medical Information
Systems. Journal of Medical Systems 37, 1-8 (2013)
191. Jin, Z., Teoh, A.B.J., Thian, S.O., Tee, C.: Typing dynamics biometric authentication through fuzzy logic. In:
Proceedings - International Symposium on Information Technology 2008, ITSim. (2008)
192. Jo, J., Kim, Y., Lee, S.: Mindmetrics: Identifying users without their login IDs. In: 2014 IEEE International
Conference on Systems, Man, and Cybernetics (SMC), pp. 2121-2126. (2014)
193. Joshi, S.S., Phoha, V.V.: Competition between SOM clusters to model user authentication system in computer
networks. In: Proceedings of the 2007 2nd International Conference on Communication System Software and
Middleware and Workshops, COMSWARE 2007. (2007)
194. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33, 168-176 (1990)
195. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based
authentication system for smartphones. Security and Communication Networks (2014)
196. Kang, B.J., Park, K.R.: A new multi-unit iris authentication based on quality assessment and score level fusion for
mobile phones. Machine Vision and Applications 21, 541-553 (2010)
197. Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input
devices. Information Sciences 308, 72-93 (2015)
198. Karuppiah, M., Saravanan, R.: A Secure Authentication Scheme with User Anonymity for Roaming Service in
Global Mobility Networks. Wireless Personal Communications 84, 2055-2078 (2015)
199. Khakzar, M., Pourghassem, H.: Human authentication algorithm using spectral feature of retinal fundus image.
International Journal of Tomography and Simulation 28, 23-38 (2015)
200. Khamis, M., Alt, F., Hassib, M., Zezschwitz, E.v., Hasholzner, R., Bulling, A.: GazeTouchPass: Multimodal
Authentication Using Gaze and Touch on Mobile Devices. Proceedings of the 2016 CHI Conference Extended
Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016)
201. Khan, G.N., Moessner, M.: Low-cost authentication protocol for passive, computation capable RFID tags. Wireless
Networks 21, 565-580 (2015)
202. Khan, M.K., Alghathbar, K., Zhang, J.: Privacy-preserving and tokenless chaotic revocable face authentication
scheme. Telecommunication Systems 47, 227-234 (2011)
203. Khot, R.A., Srinathan, K., Khot, R.A.: NAPTune: fine tuning graphical authentication. Proceedings of the 3rd
International Conference on Human Computer Interaction. ACM, Bangalore, India (2011)
204. Khot, R.A., Srinathan, K., Kumaraguru, P.: MARASIM: a novel jigsaw based authentication scheme using tagging.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada
(2011)
205. Khoury, E., El Shafey, L., McCool, C., Günther, M., Marcel, S.: Bi-modal biometric authentication on mobile phones
in challenging conditions. Image and Vision Computing 32, 1147-1160 (2014)
206. Kikuchi, H., Nagai, K., Ogata, W., Nishigaki, M.: Privacy-preserving similarity evaluation and application to remote
biometrics authentication. Soft Computing 14, 529-536 (2010)
207. Kim, S.K., Chung, M.G.: More secure remote user authentication scheme. Computer Communications 32, 1018-1021
(2009)
208. Kotropoulos, C., Tefas, A., Pitas, I.: Frontal face authentication using morphological elastic graph matching. IEEE
Transactions on Image Processing 9, 555-560 (2000)
209. Kratz, S., Aumi, M.T.I.: AirAuth: a biometric authentication system using in-air hand gestures. CHI '14 Extended
Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada (2014)
210. Krause, M.: A behavioral biometrics based authentication method for MOOC's that is robust against imitation
attempts. Proceedings of the first ACM conference on Learning @ scale conference. ACM, Atlanta, Georgia, USA
(2014)
211. Kuber, R., Sharma, S.: Toward tactile authentication for blind users. Proceedings of the 12th international ACM
SIGACCESS conference on Computers and accessibility. ACM, Orlando, Florida, USA (2010)
212. Kuber, R., Yu, W.: Feasibility study of tactile-based authentication. International Journal of Human-Computer
Studies 68, 158-181 (2010)
213. Kulkarni, S., Raut, R.D., Dakhole, P.K.: A Novel Authentication System Based on Hidden Biometric Trait. Procedia
Computer Science 85, 255-262 (2016)
214. Kulkarni, S., Raut, R.D., Dakhole, P.K.: Wavelet Based Modern Finger Knuckle Authentication. Procedia Computer
Science 70, 649-657 (2015)
215. Kumar, A., Garg, S., Hanmandlu, M.: Biometric authentication using finger nail plates. Expert Systems with
Applications 41, 373-386 (2014)
216. Kumar, A., Zhang, D.: Integrating palmprint with face for user authentication. In: Workshop on Multimodal User
Authentication (MMUA 2003), pp. 107-112. Citeseer, (2003)
217. Kumar, A., Zhang, D.: Personal recognition using hand shape and texture. IEEE Transactions on Image Processing
15, 2454-2461 (2006)
218. Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics
50, 597-600 (2004)
219. Kumar, N., Kaur, K., Misra, S.C., Iqbal, R.: An intelligent RFID-enabled authentication scheme for healthcare
applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications 1-17 (2015)
220. Kumar, T.R., Raghavan, S.: PassPattern System (PPS): a pattern-based user authentication scheme. In: International
Conference on Research in Networking, pp. 162-169. Springer, (2008)
221. Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication
scheme for session initiation protocol. Peer-to-Peer Networking and Applications 1-14 (2015)
222. Kumari, S., Gupta, M.K., Kumar, M.: Cryptanalysis and security enhancement of Chen et al.’s remote user
authentication scheme using smart card. Central European Journal of Computer Science 2, 60-75 (2012)
223. Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart
card. International Journal of Communication Systems 29, 441-458 (2016)
224. Kumari, S., Om, H.: A modified remote authentication method with smartcards and check digits. In: Proceedings -
2014 International Conference on Data Science and Engineering, ICDSE 2014, pp. 206-209. (2014)
225. Kuribara, T., Shizuki, B., Tanaka, J.: Vibrainput: two-step PIN entry system based on vibration and visual
information. CHI '14 Extended Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada
(2014)
226. Kwon, T., Hong, J.: Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording
Attacks. IEEE Transactions on Information Forensics and Security 10, 278-292 (2015)
227. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770-772
(1981)
228. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for
wireless environments. IEEE Transactions on Industrial Electronics 53, 1683-1687 (2006)
229. Lee, C.-C., Hwang, M.-S., Yang, W.-P.: A flexible remote user authentication scheme using smart cards. SIGOPS
Oper. Syst. Rev. 36, 46-52 (2002)
230. Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user authentication scheme using hash functions. SIGOPS Oper. Syst.
Rev. 36, 23-29 (2002)
231. Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID based remote user authentication scheme for multi-server
environment using smart cards. Expert Systems with Applications 38, 13863-13870 (2011)
232. Lee, C.-Y., Lin, C.-H., Chang, C.-C.: An improved low computation cost user authentication scheme for mobile
communication. In: 19th International Conference on Advanced Information Networking and Applications
(AINA'05) Volume 1 (AINA papers), pp. 249-252. IEEE, (2005)
233. Lee, G., Jun-bin, C.A.O., Haitao, Y., Lili, D.: International Conference on Solid State Devices and Materials Science,
April 1-2, 2012, MacaoEyebrows Identity Authentication Based on Wavelet Transform and Support Vector
Machines. Physics Procedia 25, 1337-1341 (2012)
234. Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme for site authentication. In: Lecture Notes in Computer
Science, pp. 111-116. (2005)
235. Lee, J., Park, H., Bang, G., Song, J.: POSTER: A Password-based Authentication by Splitting Roles of User
Interface. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM,
Denver, Colorado, USA (2015)
236. Lee, N.Y., Chiu, Y.C.: Improved remote authentication scheme with smart card. Computer Standards and Interfaces
27, 177-180 (2005)
237. Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In:
Symposium on cryptography and information security. (2006)
238. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improved efficient remote user authentication scheme using smart cards. IEEE
Transactions on Consumer Electronics 50, 565-567 (2004)
239. Lee, T.-F.: An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for
Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-9 (2013)
240. Lee, Y., Chung, Y., Moon, K.: Secure face authentication framework in open networks. ETRI Journal 32, 950-960
(2010)
241. Lee, Y., Kim, J., Jeon, W., Won, D.: Design of a simple user authentication scheme using QR-code for mobile
device. Information Technology Convergence, Secure and Trust Computing, and Data Management, pp. 241-247.
Springer (2012)
242. Lee, Y.S., Kim, E., Jung, M.S.: A smart card based user authentication scheme for multi-server environment. In:
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication,
ICUIMC 2011. (2011)
243. Leea, W.B., Chen, T.H., Sun, W.R., Ho, K.I.J.: An S/Key-like one-time password authentication scheme using smart
cards for smart meter. In: Proceedings - 2014 IEEE 28th International Conference on Advanced Information
Networking and Applications Workshops, IEEE WAINA 2014, pp. 281-286. (2014)
244. Leftheriotis, I.: User authentication in a multi-touch surface: a chord password system. CHI '13 Extended Abstracts
on Human Factors in Computing Systems. ACM, Paris, France (2013)
245. Leicher, A., Schmidt, A.U., Shah, Y.: Smart OpenID: a smart card based OpenID protocol. In: IFIP International
Information Security Conference, pp. 75-86. Springer, (2012)
246. León-Coca, J.M., Reina, D.G., Toral, S.L., Barrero, F., Bessis, N.: Authentication Systems Using ID Cards over NFC
Links: The Spanish Experience Using DNIe. Procedia Computer Science 21, 91-98 (2013)
247. Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless
communications. Mathematical and Computer Modelling 55, 35-44 (2012)
248. Li, D., Sang, L., Yang, Y., Wu, Z.: Bimodal speaker identification using dynamic bayesian network. Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 3338, pp. 577-585 (2004)
249. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling.
International Journal of Information Security 13, 229-244 (2014)
250. Li, F., Wechsler, H.: Face authentication using recognition-by-parts, boosting and transduction. International Journal
of Pattern Recognition and Artificial Intelligence 23, 545-573 (2009)
251. Li, L., Zhao, X., Xue, G.: Unobservable Re-authentication for Smartphones. In: NDSS. (2013)
252. Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password authentication scheme for multiserver architecture using
neural networks. IEEE Transactions on Neural Networks 12, 1498-1504 (2001)
253. Li, X., Liao, J., Kumari, S., Liang, W., Wu, F., Khan, M.K.: A New Dynamic ID-Based User Authentication Scheme
Using Mobile Device: Cryptanalysis, the Principles and Design. Wireless Personal Communications 85, 263-288
(2015)
254. Li, X., Niu, J., Khan, M.K., Liao, J.: Security Analysis and Enhancement of a Dynamic Identity Based
Authentication Scheme Using Smart Cards. In: Biometrics and Security Technologies (ISBAST), 2013 International
Symposium on, pp. 149-154. (2013)
255. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W.: An enhancement of a smart card authentication scheme for multi-
server architecture. Wireless Personal Communications 80, 175-192 (2015)
256. Li, X., Niu, J., Liu, Y., Liao, J., Liang, W.: Robust dynamic ID-based remote user authentication scheme using smart
cards. International Journal of Ad Hoc and Ubiquitous Computing 17, 254-264 (2014)
257. Li, X., Wang, K., Shen, J., Kumari, S., Wu, F., Hu, Y.: An enhanced biometrics-based user authentication scheme for
multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing 7, 427-
443 (2016)
258. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: Secure privacy-preserving biometric authentication scheme for telecare
medicine information systems. Journal of medical systems 38, 1-8 (2014)
259. Li, X., Wen, Q., Zhang, H., Jin, Z.: An improved authentication with key agreement scheme on elliptic curve
cryptosystem for global mobility networks. International Journal of Network Management 23, 311-324 (2013)
260. Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: A secure image-based authentication scheme for mobile devices. In: Lecture
Notes in Computer Science, pp. 751-760. (2005)
261. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. Journal of
Computer and System Sciences 72, 727-740 (2006)
262. Liao, Y.-P., Hsiao, C.-M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer
protocol. Ad Hoc Networks 18, 133-146 (2014)
263. Liao, Y.P., Hsiao, C.M.: A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols. Smart
Innovation, Systems and Technologies, vol. 21, pp. 1-13 (2013)
264. Liaw, H.-T., Fan, S.-W., Wu, W.-C.: A simple password authentication using a polynomial. SIGOPS Oper. Syst.
Rev. 38, 74-79 (2004)
265. Lin, C.-L., Hwang, T.: A password authentication scheme with secure password updating. Computers & Security 22,
68-72 (2003)
266. Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new strong-password authentication scheme using one-way hash functions.
Journal of Computer and Systems Sciences International 45, 623-626 (2006)
267. Lin, I.-C., Chang, C.-C.: A countable and time-bound password-based user authentication scheme for the applications
of electronic commerce. Information Sciences 179, 1269-1277 (2009)
268. Lin, M.-H., Chang, C.-C.: A secure one-time password authentication scheme with low-computation for mobile
communications. SIGOPS Oper. Syst. Rev. 38, 76-84 (2004)
269. Lin, T.H., Shih, W.P., Chen, W.C., Ho, W.Y.: 3D face authentication by mutual coupled 3D and 2D feature
extraction. Proceedings of the 44th annual Southeast regional conference. ACM, Melbourne, Florida (2006)
270. Liou, J.C., Conway, J.: A single-factor dynamic authentication for computer systems with touch screens. In: 23rd
International Conference on Software Engineering and Data Engineering, SEDE 2014, pp. 31-36. (2014)
271. Liu, J., Yu, F.R., Lung, C.H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous
authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications 8, 806-815
(2009)
272. Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a
single tri-axis accelerometer. Proceedings of the 11th International Conference on Human-Computer Interaction with
Mobile Devices and Services. ACM, Bonn, Germany (2009)
273. Liu, J.Y., Zhou, A.M., Gao, M.X.: A new mutual authentication scheme based on nonce and smart cards. Computer
Communications 31, 2205-2209 (2008)
274. Lo, N., Tsai, J.: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks
Without Pairings. IEEE Transactions on Intelligent Transportation Systems (2015)
275. Lo, N.-W., Yeh, K.-H.: An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system.
In: International Conference on Embedded and Ubiquitous Computing, pp. 43-56. Springer, (2007)
276. Lo, N.W., Yeh, K.H.: Mutual RFID authentication scheme for resource-constrained tags. Journal of Information
Science and Engineering 26, 1875-1889 (2010)
277. Lopez, N., Rodriguez, M., Fellegi, C., Long, D., Schwarz, T.: Even or Odd: A Simple Graphical Authentication
System. IEEE Latin America Transactions 13, 804-809 (2015)
278. Loutrel, M., Urien, P., Gaïti, D.: Authentication in wireless networks: state of the art and integration with smart card.
Annales des Télécommunications 59, 130-148 (2004)
279. Lu, Y., Wu, X., Yang, X.: A secure anonymous authentication scheme for wireless communications using smart
cards. International Journal of Network Security 17, 237-245 (2015)
280. Luca, A.D., Harbach, M., Zezschwitz, E.v., Maurer, M.-E., Slawik, B.E., Hussmann, H., Smith, M.: Now you see
me, now you don't: protecting smartphone authentication from shoulder surfers. Proceedings of the 32nd annual
ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014)
281. Luca, A.D., Weiss, R., Hu, H., mann, An, X.: Eyepass - eye-stroke authentication for public terminals. CHI '08
Extended Abstracts on Human Factors in Computing Systems. ACM, Florence, Italy (2008)
282. Luca, A.D., Zezschwitz, E.v., Hu, H., mann: Vibrapass: secure authentication based on shared lies. Proceedings of
the SIGCHI Conference on Human Factors in Computing Systems. ACM, Boston, MA, USA (2009)
283. Luca, A.D., Zezschwitz, E.v., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., Langheinrich, M.: Back-
of-device authentication on smartphones. Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems. ACM, Paris, France (2013)
284. Lumini, A., Nanni, L.: An advanced multi-modal method for human authentication featuring biometrics data and
tokenised random numbers. Neurocomputing 69, 1706-1710 (2006)
285. Maio, D., Nanni, L.: Multihashing, human authentication featuring biometrics data and tokenized random number: A
case study FVC2004. Neurocomputing 69, 242-249 (2005)
286. Maiorana, E., Campisi, P., Gonz, N., lez, C., Neri, A.: Keystroke dynamics authentication for mobile phones.
Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, TaiChung, Taiwan (2011)
287. Malempati, S., Mogalla, S.: Intrusion prevention by native language password authentication scheme.
Communications in Computer and Information Science, vol. 196 CCIS, pp. 239-248 (2011)
288. Manasa, N.L., Govardhan, A., Satyanarayana, C.H.: Fusion of multiple biometric traits: Fingerprint, palmprint and
iris. Intelligent Systems Reference Library, vol. 70, pp. 287-320 (2014)
289. Mandalapu, A., Daffney Deepa, V., Raj, L.D., Anish Dev, J.: An NFC featured three level authentication system for
tenable transaction and abridgment of ATM card blocking intricacies. In: Computing and Communication
(IEMCON), 2015 International Conference and Workshop on, pp. 1-6. (2015)
290. Maqsood, S., Chiasson, S., Girouard, A.: POSTER: Passwords on flexible display devices. Proceedings of the 2013
ACM SIGSAC conference on Computer & communications security. ACM, Berlin, Germany (2013)
291. Marcel, S., Millán, J.d.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model
adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 743-752 (2007)
292. Martínez-Peláez, R., Rico-Novella, F., Forné, J., Velarde-Alvarado, P.: Security Improvement of Two Dynamic ID-
based Authentication Schemes by Sood-Sarje-Singh. Journal of Applied Research and Technology 11, 755-763
(2013)
293. Matsuyama, Y., Shozawa, M., Yokote, R.: Brain signal׳s low-frequency fits the continuous authentication.
Neurocomputing 164, 137-143 (2015)
294. Medikonda, J., Madasu, H., B.K, P.: Information set based gait authentication system. Neurocomputing
295. Meng, Y., Wong, D.S., Kwok, L.-F.: Design of touch dynamics based user authentication with an adaptive
mechanism on mobile phones. Proceedings of the 29th Annual ACM Symposium on Applied Computing. ACM,
Gyeongju, Republic of Korea (2014)
296. Meng, Y., Wong, D.S., Schlegel, R.: Touch gestures based biometric authentication scheme for touchscreen mobile
phones. In: International Conference on Information Security and Cryptology, pp. 331-350. Springer, (2012)
297. Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings - 2012
IEEE 7th International Conference on Networking, Architecture and Storage, NAS 2012, pp. 39-48. (2012)
298. Mihajlov, M., Jerman-Blažič, B.: On designing usable and secure recognition-based graphical authentication
mechanisms. Interacting with Computers 23, 582-593 (2011)
299. Mir, O., Munilla, J., Kumari, S.: Efficient anonymous authentication with key agreement protocol for wireless
medical sensor networks. Peer-to-Peer Networking and Applications 1-13 (2015)
300. Mir, O., Nikooghadam, M.: A Secure Biometrics Based Authentication with Key Agreement Scheme in
Telemedicine Networks for E-Health Services. Wireless Personal Communications 83, 2439-2461 (2015)
301. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure and efficient ECC-based user anonymity-preserving session
initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 9, 171-192 (2016)
302. Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K.: Cryptanalysis and Improvement of Yan et
al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical
Systems 38, 1-12 (2014)
303. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A.: Security Enhancement of a Biometric based
Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems 38, 1-
11 (2014)
304. Mishra, D.: Design and Analysis of a Provably Secure Multi-server Authentication Scheme. Wireless Personal
Communications 86, 1095-1119 (2016)
305. Mishra, R., Barnwal, A.K.: A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical
Information Systems. Journal of Medical Systems 39, 1-10 (2015)
306. Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time continuous iris recognition for authentication using an eye
tracker. Proceedings of the 2012 ACM conference on Computer and communications security. ACM, Raleigh, North
Carolina, USA (2012)
307. Mock, P., Edelmann, r., Schilling, A., Rosenstiel, W.: User identification using raw sensor data from typing on
interactive displays. Proceedings of the 19th international conference on Intelligent User Interfaces. ACM, Haifa,
Israel (2014)
308. Mondal, A., Roy, K., Bhattacharya, P.: Secure and simplified access to home appliances using Iris recognition. In:
Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009. CIB 2009. IEEE Workshop
on, pp. 22-29. (2009)
309. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM conference on
Computer and communications security, pp. 48-56. ACM, (1997)
310. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Generation computer
systems 16, 351-359 (2000)
311. Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An Elliptic Curve-based Mutual Authentication Scheme for
RFID Implant Systems. Procedia Computer Science 32, 198-206 (2014)
312. Mudholkar, S.S., Shende, P.M., Sarode, M.V.: Biometrics authentication technique for intrusion detection systems
using fingerprint recognition. International Journal of Computer Science, Engineering and Information Technology 2,
57-65 (2012)
313. Nader, J., Alsadoon, A., Prasad, P.W.C., Singh, A.K., Elchouemi, A.: Designing Touch-Based Hybrid Authentication
Method for Smartphones. Procedia Computer Science 70, 198-204 (2015)
314. Nakakuni, M., Dozono, H., Tokushima, H., Noguchi, Y.: Application of self organizing maps for the integrated
authentication using keystroke timings and handwritten symbols. WSEAS Transactions on Information Science and
Applications 4, 413-420 (2007)
315. Nam, J., Choo, K.K.R., Paik, J.: A provably-anonymous authentication scheme for roaming services. International
Journal of Security and its Applications 10, 193-204 (2016)
316. Nam, J., Kim, M., Paik, J., Lee, Y., Won, D.: A provably-secure ECC-based authentication scheme for wireless
sensor networks. Sensors 14, 21023-21044 (2014)
317. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart
cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, 299-
302 (2007)
318. Nanni, L., Lumini, A.: Human authentication featuring signatures and tokenised random numbers. Neurocomputing
69, 858-861 (2006)
319. Nanni, L., Lumini, A.: Random subspace for an improved BioHashing for face authentication. Pattern Recognition
Letters 29, 295-300 (2008)
320. Nayak, A., Bansode, R.: Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points.
Procedia Computer Science 79, 553-560 (2016)
321. Nguyen, C.X., Huang, H.-H., Kawagoe, K.: POSTER: Graphical password using object-based image ranking.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, Berlin,
Germany (2013)
322. Nguyen, T.A.T., Dang, T.K.: Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol. In:
2015 International Conference on Advanced Computing and Applications (ACOMP), pp. 1-6. (2015)
323. Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., Olivier, P.: A security assessment of tiles: a new portfolio-based
graphical authentication system. CHI '12 Extended Abstracts on Human Factors in Computing Systems. ACM,
Austin, Texas, USA (2012)
324. Nigam, A., Gupta, P.: Designing an accurate hand biometric based authentication system fusing finger knuckleprint
and palmprint. Neurocomputing 151, 1120-1132 (2015)
325. Nigam, A., Tiwari, K., Gupta, P.: Multiple texture information fusion for finger-knuckle-print authentication system.
Neurocomputing 188, 190-205 (2016)
326. Niinuma, K., Jain, A.K.: Continuous user authentication using temporal information. In: SPIE Defense, Security, and
Sensing, pp. 76670L-76670L-76611. International Society for Optics and Photonics, (2010)
327. Niinuma, K., Park, U., Jain, A.K.: Soft Biometric Traits for Continuous User Authentication. IEEE Transactions on
Information Forensics and Security 5, 771-780 (2010)
328. Nikolić, D., Vuksanović, B., Nguyen, C.: Attribute selection and intrusion detection for knowledge-based
authentication systems. In: Proceedings of the 12th IASTED International Conference on Artificial Intelligence and
Soft Computing, ASC 2008, pp. 202-207. (2008)
329. Nosseir, A., Connor, R., Renaud, K.: Question-based group authentication. Proceedings of the 18th Australia
conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments. ACM, Sydney,
Australia (2006)
330. Ntalianis, K., Tsapatsoulis, N., Drigas, A.: Video-Object Oriented Biometrics Hiding for User Authentication under
Error-Prone Transmissions. EURASIP Journal on Information Security 2011, 1-12 (2011)
331. Odelu, V., Das, A.K., Goswami, A.: An Effective and Robust Secure Remote User Authenticated Key Agreement
Scheme Using Smart Cards in Wireless Communication Systems. Wireless Personal Communications 84, 2571-2598
(2015)
332. O'Gorman, L., Bagga, A., Bentley, J.: Query-directed passwords. Computers & Security 24, 546-560 (2005)
333. O'Gorman, L., Sammon, M.J., Bentley, J., Skiba, D.J., Erhart, G.W.: Options for spoken human-computer
authentication in mobile environments. In: Proceedings of the 3rd IASTED International Conference on Human-
Computer Interaction, HCI 2008, pp. 230-235. (2008)
334. Onali, T., Ginesu, G.: Transmission-efficient image-based authentication for mobile devices. In: International
Workshop on Visual Content Processing and Representation, pp. 22-28. Springer, (2005)
335. Ota, H., Aoyama, S., Watanabe, R., Ito, K., Miyake, Y., Aoki, T.: Implementation and evaluation of a remote
authentication system using touchless palmprint recognition. Multimedia Systems 19, 117-129 (2013)
336. Ouda, O., Tsumura, N., Nakaguchi, T.: BioEncoding: A reliable tokenless cancelable biometrics scheme for
protecting iriscodes. IEICE Transactions on Information and Systems E93-D, 1878-1888 (2010)
337. Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iriscodes. In:
Proceedings - International Conference on Pattern Recognition, pp. 882-885. (2010)
338. Ouyang, H., Lee, T.: A new lip feature representation method for video-based bimodal authentication. Proceedings of
the 2005 NICTA-HCSNet Multimodal User Interaction Workshop - Volume 57. Australian Computer Society, Inc.,
Sydney, Australia (2006)
339. Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. International Journal
of Neural Systems 18, 59-66 (2008)
340. Park, M., Kita, Y., Aburada, K., Okazaki, N.: Proposal of a puzzle authentication method with shoulder-surfing
attack resistance. In: Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS
2014, pp. 495-500. (2014)
341. Part, Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi-
server authentication with key agreement scheme. Lecture Notes in Computer Science (including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7335 LNCS, pp. 391-406 (2012)
342. Part, Kim, J., Jim, S.: Authentication and key agreement method for home networks using a smart card. Lecture
Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 4705 LNCS, pp. 655-665 (2007)
343. Part, Yoo, S., Yoo, J., Park, P., Ryou, J.: A lightweight and stable authentication method for the internet access
control in smartphones. Communications in Computer and Information Science, vol. 251 CCIS, pp. 331-342 (2011)
344. Patel, A., Kalajdzic, K., Golafshan, L., Taghavi, M.: Design and implementation of a zero-knowledge authentication
framework for Java Card. International Journal of Information Security and Privacy 5, 1-18 (2011)
345. Pathan, A.-S.K., Hong, C.S.: Bilinear-pairing-based remote user authentication schemes using smart cards.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM,
Suwon, Korea (2009)
346. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., van der Lubbe, J.C.A.: Cryptanalysis of an EPC Class-1
Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence 24,
1061-1069 (2011)
347. Peris-Lopez, P., Lim, T.-L., Li, T.: Providing stronger authentication at a low cost to RFID tags operating under the
EPCglobal framework. In: International Conference on Embedded and Ubiquitous Computing, 2008. EUC'08.
IEEE/IFIP, pp. 159-166. IEEE, (2008)
348. Phan, D.T., Truong, T.T., Tran, M.T., Duong, A.D.: Two-way biometrics-based authentication scheme on mobile
devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 8860, pp. 177-190 (2014)
349. Phua, K., Chen, J., Dat, T.H., Shue, L.: Heart sound as a biometric. Pattern Recognition 41, 906-919 (2008)
350. Pintor Maestre, D.: QRP: An improved secure authentication method using QR codes. (2012)
351. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wireless Personal Communications 72, 729-745 (2013)
352. Pishva, D.: Spectroscopic Approach for Aliveness Detection in Biometrics Authentication. In: 2007 41st Annual
IEEE International Carnahan Conference on Security Technology, pp. 133-137. IEEE, (2007)
353. Podilchuk, C., Barinov, L., Hulbert, W., Jairaj, A.: Face recognition in a tactical environment. In: MILITARY
COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pp. 900-905. (2010)
354. Preuveneers, D., Joosen, W.: SmartAuth: dynamic context fingerprinting for continuous user authentication.
Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca, Spain (2015)
355. Qi, M., Lu, Y., Li, J., Li, X., Kong, J.: User-specific iris authentication based on feature selection. In: Proceedings -
International Conference on Computer Science and Software Engineering, CSSE 2008, pp. 1040-1043. (2008)
356. Qiao, M., Zhang, S., Sung, A.H., Liu, Q.: A Novel Touchscreen-Based Authentication Scheme Using Static and
Dynamic Hand Biometrics. In: Proceedings - International Computer Software and Applications Conference, pp.
494-503. (2015)
357. Rajasekaran, M.P., Suresh, M., Dhanasekaran, U.: Multimodal biometric recognition using sclera and fingerprint
based on ANFIS. In: 2014 International Conference on Recent Trends in Information Technology, ICRTIT 2014.
(2014)
358. Ramanathan, V., Wechsler, H.: Robust human authentication using appearance and holistic anthropometric features.
Pattern Recognition Letters 31, 2425-2435 (2010)
359. Ranjan, P., Om, H.: An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem.
Wireless Personal Communications 1-28 (2016)
360. Rathgeb, C., Uhl, A.: Secure iris recognition based on local intensity variations. In: International Conference Image
Analysis and Recognition, pp. 266-275. Springer, (2010)
361. Ray, P.P.: Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices.
International journal of computer trends and technology 3, 235-241 (2012)
362. Renaud, K.: A visuo-biometric authentication mechanism for older users. People and Computers XIX—The Bigger
Picture, pp. 167-182. Springer (2006)
363. Revett, K.: A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of
Control, Automation and Systems 7, 7-15 (2009)
364. Ribeiro, M.A.C., Scharcanski, J., Schuck, A.: An user identity authentication scheme adaptive to changes in face
appearance. In: Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE, pp. 1-5. (2011)
365. Ritter, D., Schaub, F., Walch, M., Weber, M.: MIBA: multitouch image-based authentication on smartphones. CHI
'13 Extended Abstracts on Human Factors in Computing Systems. ACM, Paris, France (2013)
366. Rohith, G., Bhuvaneswari, M., Kannaki, S.: Optimization of dynamic resistance against malicious attacks &
collusion through enhanced authentication schemes in application to smartcard. In: 2015 IEEE 7th National
Conference on Computing, Communication and Information Systems, NCCCIS 2015, pp. 5-10. (2015)
367. Roth, V., Schmidt, P., G, B., ldenring: The IR ring: authenticating users' touches on a multi-touch display.
Proceedings of the 23nd annual ACM symposium on User interface software and technology. ACM, New York, New
York, USA (2010)
368. Ryu, E.-K., Kim, D.-S., Yoo, K.-Y.: On Elliptic Curve Based Untraceable RFID Authentication Protocols.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, Portland, Oregon,
USA (2015)
369. Sadqi, Y., Asimi, A., Asimi, Y.: A Cryptographic Mutual Authentication Scheme for Web Applications. arXiv
preprint arXiv:1412.2908 (2014)
370. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on
multi-touch devices. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,
Austin, Texas, USA (2012)
371. Sae-Bae, N., Jakobsson, M.: Hand authentication on multi-touch tablets. Proceedings of the 15th Workshop on
Mobile Computing Systems and Applications. ACM, Santa Barbara, California (2014)
372. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Continuous user authentication using multi-modal biometrics.
Computers & Security 53, 234-246 (2015)
373. Safie, S.I., Soraghan, J.J., Petropoulakis, L.: Electrocardiogram (ECG) biometric authentication using pulse active
ratio (PAR). IEEE Transactions on Information Forensics and Security 6, 1315-1322 (2011)
374. Sagar, K., Waghmare, V.: “Measuring the Security and Reliability of Authentication of Social Networking Sites”.
Procedia Computer Science 79, 668-674 (2016)
375. Sakata, K., Maeda, T., Matsushita, M., Sasakawa, K., Tamaki, H.: Fingerprint authentication based on matching
scores with other data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), vol. 3832 LNCS, pp. 280-286 (2006)
376. Samangouei, P., Patel, V.M., Chellappa, R.: Facial Attributes for Active Authentication on Mobile Devices. Image
and Vision Computing (2016)
377. Sandirigama, M., Shimizu, A.: Simple and secure password authentication protocol (SAS). IEICE Transactions on
Communications 83, 1363-1365 (2000)
378. Sarier, N.D.: A new approach for biometric template storage and remote authentication. In: International Conference
on Biometrics, pp. 909-918. Springer, (2009)
379. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Robust Biometric-Based Authentication Scheme for Wireless
Body Area Network Using Elliptic Curve Cryptosystem. Proceedings of the Third International Symposium on
Women in Computing and Informatics. ACM, Kochi, India (2015)
380. Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems. ACM, Florence, Italy (2008)
381. Sathish Babu, B., Venkataram, P.: Transaction based authentication scheme for mobile communication: A cognitive
agent based approach. In: Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS
2007; Abstracts and CD-ROM. (2007)
382. Schneegass, S., Oualil, Y., Bulling, A.: SkullConduct: Biometric User Identification on Eyewear Computers Using
Bone Conduction Through the Skull. Proceedings of the 2016 CHI Conference on Human Factors in Computing
Systems. ACM, Santa Clara, California, USA (2016)
383. Shanmugapriya, D., Padmavathi, G.: A wrapper based feature subset selection using ACO-ELM-ANP and GA-ELM-
ANP approaches for keystroke dynamics authentication. In: International Conference on Signal Processing, Image
Processing and Pattern Recognition 2013, ICSIPR 2013. (2013)
384. Shen, H., Gao, C., He, D., Wu, L.: New biometrics-based authentication scheme for multi-server environment in
critical systems. Journal of Ambient Intelligence and Humanized Computing 6, 825-834 (2015)
385. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: A modified remote user authentication scheme using smart cards. IEEE
Transactions on Consumer Electronics 49, 414-416 (2003)
386. Shen, Z.-h.: A new modified remote user authentication scheme using smart cards. Applied Mathematics-A Journal
of Chinese Universities 23, 371-376 (2008)
387. Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision tree-based method for user authentication based on
keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35, 826-833 (2005)
388. Shi, P., Zhu, B., Youssef, A.: A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. In: 2009 Third
International Conference on Emerging Security Information, Systems and Technologies, pp. 237-241. (2009)
389. Shi, W.-M., Yang, Y.-G., Zhou, Y.-H.: Quantum signature-masked authentication schemes. Optik - International
Journal for Light and Electron Optics 126, 3544-3548 (2015)
390. Shieh, W.G., Wang, M.T.: Improvement of chen et al.’s fingerprint biometric remote authentication scheme. ICIC
Express Letters 9, 1571-1575 (2015)
391. Shimizu, A., Horioka, T., Inagaki, H.: A password authentication method for contents communications on the
Internet. IEICE transactions on communications 81, 1666-1673 (1998)
392. Shimizu, A.: A dynamic password authentication method using a one‐way function. Systems and computers in Japan
22, 32-40 (1991)
393. Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: A smarter geolocation-based authentication
scheme. Security and Communication Networks 8, 3927-3938 (2015)
394. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on
elliptic curves for Internet of Things (IoT). In: Information Technology: Towards New Smart World (NSITNSW),
2015 5th National Symposium on, pp. 1-6. (2015)
395. Shuren, L., Qiuyan, Z., Chao, C., Yiqi, D.: A unidirectional one-time password authentication scheme without
counter desynchronization. In: 2009 Second ISECS International Colloquium on Computing, Communication,
Control, and Management, CCCM 2009, pp. 361-364. (2009)
396. Singh, Y.N., Singh, S.K., Gupta, P.: Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual
authentication system. Pattern Recognition Letters 33, 1932-1941 (2012)
397. Sodhi, B.: Using dropped call as an authentication factor. In: Proceedings - 15th IEEE International Conference on
Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing
and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure
Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom
2015, pp. 2031-2035. (2015)
398. Somayaji, A., Mould, D., Brown, C.: Towards narrative authentication: or, against boring authentication. Proceedings
of the 2013 workshop on New security paradigms workshop. ACM, Banff, Alberta, Canada (2013)
399. Sreeja, C.S., Misbahuddin, M.: A secure image-based authentication scheme employing DNA crypto and
steganography. In: ACM International Conference Proceeding Series, pp. 595-601. (2015)
400. Sreeramareddy, L., Miao, S., Feng, J.H.: Investigating gesture-based password: usability and vulnerability to
shoulder-surfing attacks. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems.
ACM, Towson, Maryland (2014)
401. Srinivasa, K.G., Gosukonda, S.: Continuous multimodal user authentication: coupling hard and soft biometrics with
support vector machines to attenuate noise. CSI Transactions on ICT 2, 129-140 (2014)
402. Sriram, J.C., Shin, M., Choudhury, T., Kotz, D.: Activity-aware ECG-based patient authentication for remote health
monitoring. Proceedings of the 2009 international conference on Multimodal interfaces. ACM, Cambridge,
Massachusetts, USA (2009)
403. Srisuk, S., Petrou, M., Kurutach, W., Kadyrov, A.: A face authentication system using the trace transform. Pattern
Analysis and Applications 8, 50-61 (2005)
404. Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN: Secure mobile transaction authentication. In: International
Conference on Availability, Reliability and Security, 2009. ARES'09., pp. 578-583. IEEE, (2009)
405. Sun, H.-M.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer
Electronics 46, 958-961 (2000)
406. Suoranta, S., Andrade, A., Aura, T.: Strong authentication with mobile phone. Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7483 LNCS,
pp. 70-85 (2012)
407. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. Proceedings
of the 7th workshop on Multimedia and security. ACM, New York, NY, USA (2005)
408. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations in feature vector structure in keystroke dynamics
authentication systems. Software Quality Journal 24, 137-157 (2016)
409. Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. In:
International Conference on Mobile Human-Computer Interaction, pp. 347-351. Springer, (2003)
410. Takada, T., Kokubun, Y.: Extended PIN authentication scheme allowing multi-touch key input. In: ACM
International Conference Proceeding Series, pp. 307-310. (2013)
411. Takada, T.: FakePointer: An authentication scheme for improving security against peeping attacks using video
cameras. In: Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services
and Technologies, UBICOMM 2008, pp. 395-400. (2008)
412. Tamrakar, S., Ekberg, J.-E., Asokan, N.: Identity verification schemes for public transport ticketing with NFC
phones. Proceedings of the sixth ACM workshop on Scalable trusted computing. ACM, Chicago, Illinois, USA
(2011)
413. Tan, Z.: Analysis and improvement of a user authentication improved protocol. Journal of Networks 5, 622-630
(2010)
414. Tan, Z.: Improvement on a password authentication scheme for multi-server environments. Journal of Convergence
Information Technology 6, 218-228 (2011)
415. Tang, Y., Hidenori, N., Urano, Y.: User authentication on smart phones using a data mining method. In: 2010
International Conference on Information Society, i-Society 2010, pp. 173-178. (2010)
416. Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: A multiple layer fusion approach on keystroke dynamics. Pattern
Analysis and Applications 14, 23-36 (2011)
417. Thiranant, N., Lee, H.: A Design of e-Healthcare Authentication Framework with QR Code. International Journal of
Security and Its Applications 8, 79-86 (2014)
418. Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of GeoPass: a geographic location-
password scheme. Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United
Kingdom (2013)
419. Thorpe, J., Oorschot, P.C.v., Somayaji, A.: Pass-thoughts: authenticating with our minds. Proceedings of the 2005
workshop on New security paradigms. ACM, Lake Arrowhead, California (2005)
420. Topkara, U., Atallah, M.J., Topkara, M.: Passwords decay, words endure: secure and re-usable multiple password
mnemonics. Proceedings of the 2007 ACM symposium on Applied computing. ACM, Seoul, Korea (2007)
421. Traore, I., Woungang, I., Obaidat, M.S., Nakkabi, Y., Lai, I.: Online risk-based authentication using behavioral
biometrics. Multimedia Tools and Applications 71, 575-605 (2014)
422. Trojahn, M., Ortmeier, F.: Biometric authentication through a virtual keyboard for smartphones. International Journal
of Computer Science & Information Technology 4, 1 (2012)
423. Truong, T.T., Tran, M.T., Duong, A.D.: Modified efficient and secure dynamic ID-based user authentication scheme.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 7804 LNCS, pp. 409-415 (2013)
424. Tsai, J.-L., Lo, N.-W., Wu, T.-C.: A New Password-Based Multi-server Authentication Scheme Robust to Password
Guessing Attacks. Wireless Personal Communications 71, 1977-1988 (2013)
425. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table.
Computers & Security 27, 115-121 (2008)
426. Tsalakanidou, F., Malassiotis, S., Strintzis, M.G.: Exploitation of 3D images for face authentication under pose and
illumination variations. In: 3D Data Processing, Visualization and Transmission, 2004. 3DPVT 2004. Proceedings.
2nd International Symposium on, pp. 50-57. (2004)
427. Tseng, Y.-M., Wu, T.-Y., Wu, J.-D.: A pairing-based user authentication scheme for wireless clients with smart
cards. Informatica 19, 285-302 (2008)
428. Tsuchiya, T., Kihara, M., Berena, A.J.P.: Transmission time-based authentication scheme using 3G mobile device for
DRM system. In: 2009 IEEE International Frequency Control Symposium Joint with the 22nd European Frequency
and Time Forum, pp. 706-710. (2009)
429. Tullis, T.S., Tedesco, D.P.: Using personal photos as pictorial passwords. CHI '05 Extended Abstracts on Human
Factors in Computing Systems. ACM, Portland, OR, USA (2005)
430. Umar, M.S., Rafiq, M.Q.: Select-to-Spawn: A novel recognition-based graphical user authentication scheme. In:
2012 IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2012. (2012)
431. Usha, K., Ezhilarasan, M.: Robust personal authentication using finger knuckle geometric and texture features. Ain
Shams Engineering Journal (2016)
432. Vaidya, B., Park, J.H., Yeo, S.-S., Rodrigues, J.J.P.C.: Robust one-time password authentication scheme using smart
card for home network environment. Computer Communications 34, 326-336 (2011)
433. Van, H.T., Tat, P.Q., Le, T.H.: Palmprint verification using GridPCA for Gabor features. Proceedings of the Second
Symposium on Information and Communication Technology. ACM, Hanoi, Vietnam (2011)
434. Varenhorst, C., Kleek, M., Rudolph, L.: Passdoodles: A lightweight authentication method. Research Science
Institute (2004)
435. Vasuhi, S., Vaidehi, V., Babu, N.T.N., Treesa, T.M.: An efficient multi-modal biometric person authentication
system using Fuzzy Logic. In: 2010 2nd International Conference on Advanced Computing, ICoAC 2010, pp. 74-81.
(2010)
436. Venkat, I., De Wilde, P.: Robust Gait Recognition by Learning and Exploiting Sub-gait Characteristics. International
Journal of Computer Vision 91, 7-23 (2011)
437. Venkataram, P., Babu, B.S.: An authentication scheme for ubiquitous commerce: A cognitive agents based approach.
In: 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, pp. 248-256. (2008)
438. Vijilious, M.A.L., Ganapathy, S., Bharathi, V.S.: Palmprint feature extraction approach using nonsubsampled
contourlet transform and orthogonal moments. Proceedings of the International Conference on Advances in
Computing, Communications and Informatics. ACM, Chennai, India (2012)
439. Vo, D.L., Kim, K.: Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and
ECC. In: International Conference on Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP, pp.
144-147. (2007)
440. Vorugunti, C.S., Indukuri, S.S.V.: A Secure and Efficient BiometricAuthentication as a Service for Cloud
Computing. Proceedings of the 6th IBM Collaborative Academia Research Exchange Conference (I-CARE) on I-
CARE 2014. ACM, Bangalore, India (2014)
441. W, A., jtowicz, Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices.
Personal Ubiquitous Comput. 20, 195-207 (2016)
442. Wan, J., Bai, Z., Bai, X.: Secure group identity authentication based on non-perfect secret sharing scheme. In:
ICALIP 2012 - 2012 International Conference on Audio, Language and Image Processing, Proceedings, pp. 149-154.
(2012)
443. Wang, B., Ma, M.: A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme. Wireless
Personal Communications 68, 361-378 (2013)
444. Wang, B.J., Zhang, H.G., Wang, Y.H.: Secure password-based authentication scheme with anonymous identity
without smart cards. Tongxin Xuebao/Journal on Communications 29, 70-75 (2008)
445. Wang, C., Li, Y., Song, X.: Video-to-video face authentication system robust to pose variations. Expert Systems with
Applications 40, 722-735 (2013)
446. Wang, D., Ma, C.-g.: Cryptanalysis of a remote user authentication scheme for mobile client–server environment
based on ECC. Information Fusion 14, 498-503 (2013)
447. Wang, F., Han, J.: Multimodal biometric authentication based on score level fusion using support vector machine.
Opto-Electronics Review 17, 59-64 (2009)
448. Wang, J., Li, Y., Ao, X., Wang, C., Zhou, J.: Multi-modal biometric authentication fusing iris and palmprint based on
GMM. In: 2009 IEEE/SP 15th Workshop on Statistical Signal Processing, pp. 349-352. IEEE, (2009)
449. Wang, K., Zhang, Y., Yuan, Z., Zhuang, D.: Hand vein recognition based on multi supplemental features of multi-
classifier fusion decision. In: 2006 International Conference on Mechatronics and Automation, pp. 1790-1795. IEEE,
(2006)
450. Wang, P., Ku, C.-C., Wang, T.C.: A new fingerprint authentication scheme based on secret-splitting for enhanced
cloud security. Recent Application in Bio-metrics 183-196 (2011)
451. Wang, S.-Q., Wang, J.-Y., Li, Y.-Z.: The Web Security Password Authentication based the Single-block Hash
Function. IERI Procedia 4, 2-7 (2013)
452. Wang, X., Guo, F., Ma, J.-f.: User authentication via keystroke dynamics based on difference subspace and slope
correlation degree. Digital Signal Processing 22, 707-712 (2012)
453. Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user
authentication scheme using smart cards. Computer Standards and Interfaces 29, 507-512 (2007)
454. Wang, Y., Plataniotis, K.: Face based biometric authentication with changeable and privacy preservable templates.
In: Biometrics Symposium, 2007, pp. 1-6. IEEE, (2007)
455. Wang, Y., Plataniotis, K.: Face based biometric authentication with changeable and privacy preserving templates. In:
Biometric Symposium, BSYM. (2007)
456. Wang, Z., Huo, Z., Shi, W.: A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare
Medicine Information Systems. Journal of Medical Systems 39, 1-8 (2014)
457. Wang, Z., Jing, J., Li, L.: Time evolving graphical password for securing mobile devices. Proceedings of the 8th
ACM SIGSAC symposium on Information, computer and communications security. ACM, Hangzhou, China (2013)
458. Watanabe, Y., Houryu, Fujita, T.: Toward Introduction of Immunity-based Model to Continuous Behavior-based
User Authentication on Smart Phone. Procedia Computer Science 22, 1319-1327 (2013)
459. Wei, J., Hu, X., Liu, W.: Two‐factor authentication scheme using attribute and password. International Journal of
Communication Systems (2014)
460. Weiss, R., Luca, A.D.: PassShapes: utilizing stroke based authentication to increase password memorability.
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges. ACM, Lund, Sweden
(2008)
461. Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Computers
& Electrical Engineering 38, 381-387 (2012)
462. Wen, F., Susilo, W., Yang, G.: A Secure and Effective Anonymous User Authentication Scheme for Roaming
Service in Global Mobility Networks. Wireless Personal Communications 73, 993-1004 (2013)
463. Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.-C.: Design and evaluation of a shoulder-surfing resistant graphical
password scheme. Proceedings of the working conference on Advanced visual interfaces. ACM, Venezia, Italy
(2006)
464. Winkler, C., Gugenheimer, J., Luca, A.D., Haas, G., Speidel, P., Dobbelstein, D., Rukzio, E.: Glass Unlock:
Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display. Proceedings of the
33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015)
465. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In:
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), pp. 8 pp.
IEEE, (2006)
466. Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor
networks based on Internet of Things security. Journal of Ambient Intelligence and Humanized Computing 1-16
(2016)
467. Wu, F., Xu, L.: Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical
Information Systems. Journal of Medical Systems 37, 1-9 (2013)
468. Wu, J.S., Lin, W.C., Lin, C.T., Wei, T.E.: Smartphone continuous authentication based on keystroke and gesture
profiling. In: Security Technology (ICCST), 2015 International Carnahan Conference on, pp. 191-197. (2015)
469. Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS workshop on usable
privacy and security software. (2004)
470. Wu, S., Pu, Q., Kang, F.: Practical authentication scheme for SIP. Peer-to-Peer Networking and Applications 6, 61-
74 (2013)
471. Wu, S., Zhu, Y., Pu, Q.: Robust smart‐cards‐based user authentication scheme with user anonymity. Security and
Communication Networks 5, 236-248 (2012)
472. Wu, S.-T., Chieu, B.-C.: A user friendly remote authentication scheme with smart cards. Computers & Security 22,
547-550 (2003)
473. Wu, T.-S., Lee, M.-L., Lin, H.-Y., Wang, C.-Y.: Shoulder-surfing-proof graphical password authentication scheme.
International Journal of Information Security 13, 245-254 (2014)
474. Wu, Z.-Y., Chen, L., Wu, J.-C.: A Reliable RFID Mutual Authentication Scheme for Healthcare Environments.
Journal of Medical Systems 37, 1-9 (2013)
475. Xi, K., Hu, J., Han, F.: Mobile device access control: An improved correlation based face authentication scheme and
its Java ME application. Concurrency Computation Practice and Experience 24, 1066-1085 (2012)
476. Xiaojun, C., Zicheng, W., Yiguo, P., Jinqiao, S.: A Continuous Re-Authentication Approach Using Ensemble
Learning. Procedia Computer Science 17, 870-878 (2013)
477. Xiong, J., Xiong, J., Claramunt, C.: A spatial entropy-based approach to improve mobile risk-based authentication.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection
and Analysis. ACM, Dallas/Fort Worth, Texas (2014)
478. Xu, F., Han, S., Wang, Y., Zhang, J., Li, Y.: QRToken: Unifying Authentication Framework to Protect User Online
Identity. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, pp. 368-
373. (2015)
479. Yakovlev, V.A., Arkhipov, V.V.: User authentication based on the chess graphical password scheme resistant to
shoulder surfing. Automatic Control and Computer Sciences 49, 803-812 (2015)
480. Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Designing leakage-resilient password entry on touchscreen mobile
devices. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security.
ACM, Hangzhou, China (2013)
481. Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Leakage-resilient password entry: Challenges, design, and evaluation.
Computers & Security 48, 196-211 (2015)
482. Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P.: A Secure Biometrics-based Authentication Scheme for Telecare
Medicine Information Systems. Journal of Medical Systems 37, 1-6 (2013)
483. Yang, S., Schaumont, P., Verbauwhede, I.: Microcoded coprocessor for embedded secure biometric authentication
systems. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and
system synthesis. ACM, Jersey City, NJ, USA (2005)
484. Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In:
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.
v/609-v/612 Vol. 605. IEEE, (2005)
485. Yang, T.-C., Lo, N.-W., Liaw, H.-T., Wu, W.C.: A secure smart card authentication and authorization framework
using in multimedia cloud. Multimedia Tools and Applications 1-23 (2016)
486. Yang, W., Ma, G., Zhou, F., Liao, Q.: Feature-level fusion of finger veins and finger dorsal texture for personal
authentication based on orientation selection. IEICE Transactions on Information and Systems E96-D, 1371-1373
(2014)
487. Yang, W., Yu, X., Liao, Q.: Personal authentication using finger vein pattern and finger-dorsa texture fusion. In:
MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums, pp.
905-908. (2009)
488. Yang, X., Han, F.: Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications. Proceedings of
the 12th International Conference on Advances in Mobile Computing and Multimedia. ACM, Kaohsiung, Taiwan
(2014)
489. Yao, L., Kong, X., Wu, G., Fan, Q., Lin, C.: A privacy-preserving authentication scheme using biometrics for
pervasive computing environments. Journal of Electronics (China) 27, 68-78 (2010)
490. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W., Zou, D.: Cloud authentication based on anonymous one-time
password. Ubiquitous Information Technologies and Applications, pp. 423-431. Springer (2013)
491. Yeh, K.-H.: A lightweight authentication scheme with user untraceability. Frontiers of Information Technology &
Electronic Engineering 16, 259-271 (2015)
492. Yeh, T.-C., Wu, C.-H., Tseng, Y.-M.: Improvement of the RFID authentication scheme based on quadratic residues.
Computer Communications 34, 337-341 (2011)
493. Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Person authentication from neural activity of face-specific visual self-
representation. Pattern Recognition 46, 1159-1169 (2013)
494. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Computers and Security 24, 50-56 (2005)
495. Yoon, E.-J., Yoo, K.-Y., Ha, K.-S.: A user friendly authentication scheme with anonymity for wireless
communications. Computers & Electrical Engineering 37, 356-364 (2011)
496. Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile
devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 4537 LNCS, pp. 612-623 (2007)
497. Yoon, E.-J., Yoo, K.-Y.: More efficient and secure remote user authentication scheme using smart cards. In: 11th
International Conference on Parallel and Distributed Systems (ICPADS'05), pp. 73-77. IEEE, (2005)
498. Yu, Z., Liu, B.W., Shen, G.C.: Application of the hybrid arbitrated digital signature scheme in CSCW. In: 7th
International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2011. (2011)
499. Zack, R.S., Tappert, C.C., Cha, S.-H.: Performance of a long-text-input keystroke biometric authentication system
using an improved k-nearest-neighbor classification method. In: Fourth IEEE International Conference on
Biometrics: Theory Applications and Systems (BTAS), 2010, pp. 1-6. IEEE, (2010)
500. Zezschwitz, E.v., Koslow, A., Luca, A.D., Hussmann, H.: Making graphic-based authentication secure against
smudge attacks. Proceedings of the 2013 international conference on Intelligent user interfaces. ACM, Santa Monica,
California, USA (2013)
501. Zezschwitz, E.v., Luca, A.D., Brunkow, B., Hussmann, H.: SwiPIN: Fast and Secure PIN-Entry on Smartphones.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic
of Korea (2015)
502. Zhan, J., Fang, X.: Authentication using multi-level social networks. In: International Joint Conference on
Knowledge Discovery, Knowledge Engineering, and Knowledge Management, pp. 35-49. Springer, (2009)
503. Zhang, H., Li, M.: Security vulnerabilities of an remote password authentication scheme with smart card. In: 2011
International Conference on Consumer Electronics, Communications and Networks, CECNet 2011 - Proceedings, pp.
698-701. (2011)
504. Zhang, L., Razdan, A., Farin, G., Femiani, J., Bae, M., Lockwood, C.: 3D face authentication and recognition based
on bilateral symmetry analysis. The Visual Computer 22, 43-55 (2006)
505. Zhang, L., Tang, S., Zhu, S.: A lightweight privacy preserving authenticated key agreement protocol for SIP-based
VoIP. Peer-to-Peer Networking and Applications 9, 108-126 (2016)
506. Zhang, L., Tang, S., Zhu, S.: Privacy-preserving authenticated key agreement scheme based on biometrics for session
initiation protocol. Wireless Networks 1-16 (2016)
507. Zhang, Y., Sun, D., Qiu, Z.: A novel method for fusion operators evaluating at score-level fusion in biometric
authentication. In: International Conference on Signal Processing Proceedings, ICSP, pp. 1339-1342. (2010)
508. Zhao, G., Li, Y., Du, L., Zhao, X.: Asynchronous Challenge-Response Authentication Solution Based on Smart Card
in Cloud Environment. In: 2nd International Conference on Information Science and Control Engineering (ICISCE),
2015, pp. 156-159. (2015)
509. Zhao, H., Li, X.: S3PAS:A Scalable shoulder-surfing resistant textual-graphical password authentication scheme. In:
Proceedings - 21st International Conference on Advanced Information Networking and Applications
Workshops/Symposia, AINAW'07, pp. 467-472. (2007)
510. Zhao, Z., Ahn, G.J., Hu, H.: Picture gesture authentication: Empirical analysis, automated attacks, and scheme
evaluation. ACM Transactions on Information and System Security 17, (2015)
511. Zheng, P., Sang, N.: Using phase and directional line features for efficient palmprint authentication. In: Proceedings
of the 2009 2nd International Congress on Image and Signal Processing, CISP'09. (2009)
512. Zheng, P.: Gaussian Shape Descriptor for Palmprint Authentication. Cognitive Computation 2, 303-311 (2010)
513. Zheng, Z., Liu, X., Yin, L., Liu, Z.: A stroke-based textual password authentication scheme. In: Proceedings of the
1st International Workshop on Education Technology and Computer Science, ETCS 2009, pp. 90-95. (2009)
514. Zhou, Y., Cao, Z., Lu, R.: An efficient digital signature using self-certified public keys. Proceedings of the 3rd
international conference on Information security. ACM, Shanghai, China (2004)
515. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on
Consumer Electronics 50, 231-235 (2004)
Acceptance Topic 2 (AT2): Multi-Factor Authentication Methods
1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: A Novel Strong Password Generator for Improving Cloud
Authentication. Procedia Computer Science 85, 293-300 (2016)
2. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: An efficient framework for enhancing user authentication in cloud
storage using digital watermark. International Review on Computers and Software 10, 130-136 (2015)
3. Abdurrahman, U.A., Kaiiali, M., Muhammad, J.: A new mobile-based multi-factor authentication scheme using pre-
shared number, GPS location and time stamp. In: 2013 International Conference on Electronics, Computer and
Computation, ICECCO 2013, pp. 293-296. (2013)
4. Acharya, S., Polawar, A., Pawar, P.: Two factor authentication using smartphone generated one time password. IOSR
Journal of Computer Engineering (IOSR-JCE) 11, 85-90 (2013)
5. Adida, B.: Beamauth: Two-factor web authentication with a bookmark. In: Proceedings of the ACM Conference on
Computer and Communications Security, pp. 48-57. (2007)
6. Ahmed, M.N., Hussain, M.: Privacy Preserving Web Based Transaction Using E-Smart Cards and Image
Authentication. In: Proceedings - 2015 2nd IEEE International Conference on Advances in Computing and
Communication Engineering, ICACCE 2015, pp. 465-470. (2015)
7. Akram, S., Misbahuddin, M., Varaprasad, G.: A usable and secure two-factor authentication scheme. Information
Security Journal 21, 169-182 (2012)
8. Al-Assam, H., Jassim, S.: Robust Biometric Based Key Agreement and Remote Mutual Authentication. In: 2012
IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 59-65.
(2012)
9. Al-Assam, H., Jassim, S.A.: Multi-factor challenge/response approach for remote biometric authentication. In:
Proceedings of SPIE - The International Society for Optical Engineering. (2011)
10. Ali, A., Büchner, M., Segura, E.: Two factor authentication without the overhead of traditional OTP. In: Proceedings
of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009, pp. 141-147.
(2009)
11. Almazyad, A.S., Ahmad, Y.: A new approach in T-FA authentication with OTP using mobile phone.
Communications in Computer and Information Science, vol. 58, pp. 9-17 (2009)
12. Alnajjar, A., Janicke, H.: Multi-factor authentication using hardware information and user profiling techniques. In:
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, HAISA
2012, pp. 160-173. (2012)
13. Aloul, F., Zahidi, S., El-Hajj, W.: Multi factor authentication using mobile phones. International Journal of
Mathematics and Computer Science 4, 65-80 (2009)
14. Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE/ACS International
Conference on Computer Systems and Applications, AICCSA 2009, pp. 641-644. (2009)
15. Alpar, O.: Intelligent biometric pattern password authentication systems for touchscreens. Expert Systems with
Applications 42, 6286-6294 (2015)
16. Alqattan, A., Kaviani, N., Lewis, P., Pearson, N.: A two-factor authentication system using mobile devices to protect
against untrusted public computers. University of British Columbia, Canada 329, (2007)
17. Amin, R., Biswas, G.P.: A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With
User Anonymity. Journal of Medical Systems 39, (2015)
18. Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer USB
mass storage device. In: Proceedings of the 2015 3rd International Conference on Computer, Communication,
Control and Information Technology, C3IT 2015. (2015)
19. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Obaidat, M.S.: Design and Analysis of an Enhanced Patient-Server
Mutual Authentication Protocol for Telecare Medical Information System. Journal of Medical Systems 39, 1-20
(2015)
20. Amin, R., Islam, S.H., Biswas, P.G., Khan, M.K., Li, X.: Cryptanalysis and Enhancement of Anonymity Preserving
Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. Journal of
Medical Systems 39, 1-21 (2015)
21. Amin, R., Islam, S.K.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three-
factor authenticated key exchange protocol for wireless sensor networks. Computer Networks 101, 42-62 (2016)
22. Anzaku, E.T., Sohn, H., Ro, Y.M.: Multi-factor authentication using fingerprints and user-specific random
projection. In: Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web
Conference, APWeb 2010, pp. 415-418. (2010)
23. Ariffin, N.A.M., Sani, N.F.M.: Plan recognition scheme using multi-factors authentication for smart card online
system. In: Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014,
pp. 156-160. (2014)
24. Arshad, H., Nikooghadam, M.: Security analysis and improvement of two authentication and key agreement schemes
for session initiation protocol. Journal of Supercomputing 71, 3163-3180 (2015)
25. Arshad, H., Nikooghadam, M.: Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare
Medicine Information Systems. Journal of Medical Systems 38, (2014)
26. Arshad, H., Teymoori, V., Nikooghadam, M., Abbassi, H.: On the Security of a Two-Factor Authentication and Key
Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 39, 1-10 (2015)
27. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A perfect dynamic-id and biometric based remote user authentication
scheme under multi-server environments using smart cards. Proceedings of the 8th International Conference on
Security of Information and Networks. ACM, Sochi, Russia (2015)
28. Banerjee, S., Dutta, M.P., Bhunia, C.T.: Cryptanalysis and Security Enhancement of an Efficient and Secure
Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments. Proceedings of the 2015
International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET
2015). ACM, Unnao, India (2015)
29. Bashir, M., Kempf, J.: Person authentication with RDTW based on handwritten PIN and signature with a novel
biometric smart pen device. In: Computational Intelligence in Biometrics: Theory, Algorithms, and Applications,
2009. CIB 2009. IEEE Workshop on, pp. 63-68. IEEE, (2009)
30. Battaglia, F., Iannizzotto, G., Lo Bello, L.: A biometric authentication system based on face recognition and rfid tags.
Mondo Digitale 13, (2014)
31. Benhammadi, F., Beghdad Bey, K.: Password hardened fuzzy vault for fingerprint authentication system. Image and
Vision Computing 32, 487-496 (2014)
32. Beton, M., Marie, V., Rosenberger, C.: Biometric secret path for mobile user authentication: A preliminary study. In:
Computer and Information Technology (WCCIT), 2013 World Congress on, pp. 1-6. (2013)
33. Bhargav-Spantzel, A., Squicciarini, A., Bertino, E.: Privacy preserving multi-factor authentication with biometrics.
In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the
13th ACM Conference on Computer and Communications Security, CCS'06, pp. 63-72. (2006)
34. Bhattasali, T., Saeed, K.: Two factor remote authentication in healthcare. In: Proceedings of the 2014 International
Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pp. 380-386. (2014)
35. Bhutta, F.K., Ghafoor, A., Sultan, S.: Smart phone based authentication and authorization protocol for SPACS. In:
2012 9th International Conference on High Capacity Optical Networks and Enabling Technologies, HONET 2012,
pp. 127-131. (2012)
36. Bindu, C.S., Reddy, P.C.S., Satyanarayana, B.: Improved remote user authentication scheme preserving user
anonymity. International Journal of Computer Science and Network Security 8, 62-66 (2008)
37. Binu, S., Misbahuddin, M., Raj, P.: A Mobile Based Remote User Authentication Scheme without Verifier Table for
Cloud Based Services. Proceedings of the Third International Symposium on Women in Computing and Informatics.
ACM, Kochi, India (2015)
38. Binu, S., Mohan, A., Deepak, K.T., Manohar, S., Misbahuddin, M., Raj, P.: A proof of concept implementation of a
mobile based authentication scheme without password table for cloud environment. In: Souvenir of the 2015 IEEE
International Advance Computing Conference, IACC 2015, pp. 1224-1229. (2015)
39. Boyd, D.J.: Single sign-on to the web with an EMV card. In: 2008 International Symposium on Collaborative
Technologies and Systems, CTS'08, pp. 112-120. (2008)
40. Braeken, A.: Efficient anonym smart card based authentication scheme for multi-server architecture. International
Journal of Smart Home 9, 177-184 (2015)
41. Brasee, K., Kami Makki, S., Zeadally, S.: A secure two-factor authentication scheme for single sign-on services.
Security and Communication Networks 2, 315-323 (2009)
42. Brasee, K., Makki, S.K., Zeadally, S.: A Novel Distributed Authentication Framework for Single Sign-On Services.
In: International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE,
pp. 52-58. (2008)
43. Briggs, P., Olivier, P.L.: Biometric daemons: authentication via electronic pets. CHI '08 Extended Abstracts on
Human Factors in Computing Systems. ACM, Florence, Italy (2008)
44. Bringer, J., Chabanne, H., Pointcheval, D., Zimmer, S.: An application of the Boneh and Shacham group signature
scheme to biometric authentication. Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5312 LNCS, pp. 219-230 (2008)
45. Brömme, A., Al-Zubi, S.: Multifactor Biometric Sketch Authentication. In: BIOSIG, pp. 81-90. (2003)
46. Cao, L., Ge, W.: Analysis and improvement of a multi-factor biometric authentication scheme. Security and
Communication Networks 8, 617-625 (2015)
47. Cao, T., Huang, S.: Two-factor authentication schemes based smart card and password with user anonymity. Journal
of Computational Information Systems 9, 8831-8838 (2013)
48. Cao, T., Zhai, J.: Improved dynamic ID-based authentication scheme for telecare medical information systems.
Journal of Medical Systems 37, (2013)
49. Carullo, G., Ferrucci, F., Sarro, F.: Towards improving usability of authentication systems using smartphones for
logical and physical resource access in a single sign-on environment. Information Systems: Crossroads for
Organization, Management, Accounting and Engineering: ItAIS: The Italian Association for Information Systems,
pp. 145-153 (2013)
50. Chandrakar, P., Om, H.: RSA Based Two-factor Remote User Authentication Scheme with User Anonymity. In:
Procedia Computer Science, pp. 318-324. (2015)
51. Chang, C.-C., Hwang, S.-J.: Using smart cards to authenticate remote passwords. Computers & Mathematics with
Applications 26, 19-27 (1993)
52. Chang, C.-C., Lee, J.-S.: An efficient and secure multi-server password authentication scheme using smart cards. In:
International Conference on Cyberworlds, 2004, pp. 417-422. IEEE, (2004)
53. Chang, C.-C., Liao, W.-Y.: A remote password authentication scheme based upon ElGamal's signature scheme.
Computers & Security 13, 137-144 (1994)
54. Chang, C.-C., Nguyen, N.-T.: An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol
with Revocation. Wireless Personal Communications 1-21 (2016)
55. Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEE Proceedings E-Computers and
Digital Techniques 138, 165-168 (1991)
56. Chang, Y.F., Tai, W.L., Chang, H.C.: Untraceable dynamic‐identity‐based remote user authentication scheme with
verifiable password update. International Journal of Communication Systems 27, 3430-3440 (2014)
57. Chang, Y.F., Tai, W.L., Lin, S.C., Kwamg, T.S.: A two-factor and reader-undedicated authentication scheme with
passive RFID tags in WLAN. In: Proceedings - 2013 International Conference on Signal-Image Technology and
Internet-Based Systems, SITIS 2013, pp. 279-284. (2013)
58. Chang, Y.-F., Yu, S.-H., Shiao, D.-R.: A Uniqueness-and-Anonymity-Preserving Remote User Authentication
Scheme for Connected Health Care. Journal of Medical Systems 37, 1-9 (2013)
59. Chao, J.: An improved remote password authentication scheme with smart card. Journal of Electronics (China) 29,
550-555 (2012)
60. Chaturvedi, A., Mishra, D., Mukhopadhyay, S.: Improved biometric-based three-factor remote user authentication
scheme with key agreement using smart card. Lecture Notes in Computer Science (including subseries Lecture Notes
in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8303 LNCS, pp. 63-77 (2013)
61. Chaudhari, S., Tomar, S., Rawat, A.: Design, implementation and analysis of multi layer, Multi Factor
Authentication (MFA) setup for webmail access in multi trust networks. In: International Conference on Emerging
Trends in Networks and Computer Communications (ETNCC), 2011, pp. 27-32. IEEE, (2011)
62. Chaudhry, S.A., Farash, M.S., Naqvi, H., Kumari, S., Khan, M.K.: An enhanced privacy preserving remote user
authentication scheme with provable security. Security and Communication Networks 8, 3782-3795 (2015)
63. Chaudhry, S.A., Naqvi, H., Farash, M.S., Shon, T., Sher, M.: An improved and robust biometrics-based three factor
authentication scheme for multiserver environments. Journal of Supercomputing 1-17 (2015)
64. Chaudhry, S.A., Naqvi, H., Shon, T., Sher, M., Farash, M.S.: Cryptanalysis and Improvement of an Improved Two
Factor Authentication Protocol for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-11
(2015)
65. Chaurasia, B.K., Shahi, A., Verma, S.: Authentication in cloud computing environment using two factor
authentication. Advances in Intelligent Systems and Computing, vol. 259, pp. 779-785 (2014)
66. Cheikrouhou, O., Boujelben, M., Koubaa, A., Abid, M.: Attacks and improvement of "security enhancement for a
dynamic ID-based remote user authentication scheme". In: 2009 IEEE/ACS International Conference on Computer
Systems and Applications, AICCSA 2009, pp. 517-522. (2009)
67. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart‐card‐based remote user password authentication scheme.
International Journal of Communication Systems 27, 377-389 (2014)
68. Chen, C.L., Lee, C.C., Hsu, C.Y.: Mobile device integration of a fingerprint biometric remote authentication scheme.
International Journal of Communication Systems 25, 585-597 (2012)
69. Chen, C.T., Lee, C.C.: A two-factor authentication scheme with anonymity for multi-server environments. Security
and Communication Networks 8, 1608-1625 (2015)
70. Chen, H.-M., Lo, J.-W., Yeh, C.-K.: An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare
Medical Information Systems. Journal of Medical Systems 36, 3907-3915 (2012)
71. Chen, L., Wei, F., Ma, C.: A secure user authentication scheme against smart-card loss attack for wireless sensor
networks using symmetric key techniques. International Journal of Distributed Sensor Networks 2015, (2015)
72. Chen, T.-H., Hsiang, H.-C., Shih, W.-K.: Security enhancement on an improvement on two remote user
authentication schemes using smart cards. Future Generation Computer Systems 27, 377-380 (2011)
73. Chen, Y., Sun, J., Zhang, R., Zhang, Y.: Your song your way: Rhythm-based two-factor authentication for multi-
touch mobile devices. In: Proceedings - IEEE INFOCOM, pp. 2686-2694. (2015)
74. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A modified remote login authentication scheme based on geometric approach.
Journal of Systems and Software 55, 287-290 (2001)
75. Chong, L.G., Kiong, L.C., Letchumanan, C.: Two-factor face authentication: Topographic Independent Component
Analysis (TICA) and Multispace Random Projection (MRP). In: SoCPaR 2009 - Soft Computing and Pattern
Recognition, pp. 756-761. (2009)
76. Chuang, M.-C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust
computing using smart cards and biometrics. Expert Systems with Applications 41, 1411-1418 (2014)
77. Chudá, D., Ďurfina, M.: Multifactor authentication based on keystroke dynamics. In: ACM International Conference
Proceeding Series, pp. V.21-V.26. (2009)
78. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. Proceedings of the 2003
ACM SIGMM workshop on Biometrics methods and applications. ACM, Berkley, California (2003)
79. Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: A novel approach for dual-factor authentication. Pattern
Analysis and Applications 7, 255-268 (2004)
80. Czajka, A., Strzelczyk, P., Chochowski, M., Pacut, A.: Iris recognition with match-on-card. In: Signal Processing
Conference, 2007 15th European, pp. 189-192. (2007)
81. Czeskis, A., Dietz, M., Kohno, T., Wallach, D., Balfanz, D.: Strengthening user authentication through opportunistic
cryptographic identity assertions. In: Proceedings of the ACM Conference on Computer and Communications
Security, pp. 404-414. (2012)
82. Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards.
Journal of King Saud University - Computer and Information Sciences 27, 193-210 (2015)
83. Das, A.K., Goswami, A.: A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User
Authentication Scheme for Connected Health Care. Journal of Medical Systems 37, 1-16 (2013)
84. Das, A.K., Goswami, A.: An Enhanced Biometric Authentication Scheme for Telecare Medicine Information
Systems with Nonce Using Chaotic Hash Function. Journal of Medical Systems 38, 1-19 (2014)
85. Das, A.K.: A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale
Distributed Wireless Sensor Networks. Wireless Personal Communications 82, 1377-1404 (2015)
86. Das, A.K.: A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the
Integrated EPR Information System. Journal of Medical Systems 39, 1-14 (2015)
87. Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor
networks. Peer-to-Peer Networking and Applications 9, 223-244 (2016)
88. Das, A.K.: A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare
Medicine Information Systems. Journal of Medical Systems 39, (2015)
89. Das, A.K.: An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless
sensor networks. International Journal of Communication Networks and Distributed Systems 15, 22-60 (2015)
90. Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart
cards. IET Information Security 5, 145-151 (2011)
91. Das, M.L., Narasimhan, V.L.: EARS: Efficient Entity Authentication in Remote Systems. In: Proceedings -
International Conference on Information Technology: New Generations, ITNG 2008, pp. 603-608. (2008)
92. Das, M.L., Narasimhan, V.L.: Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic
Logic. In: Fifth International Conference on Information Technology: New Generations, 2008. ITNG 2008., pp. 545-
550. (2008)
93. Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote user authentication scheme using bilinear pairings.
Computers & Security 25, 184-189 (2006)
94. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE transactions on
Consumer Electronics 50, 629-631 (2004)
95. Das, M.L.: Secure and Efficient Authentication Scheme for Remote Systems. In: International Conference on
Information Technology, 2008. ICIT '08., pp. 226-231. (2008)
96. de Souza, R.L., Lung, L.C., Custódio, R.F.: Multi-factor Authentication in Key Management Systems. In: 2013 12th
IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 746-752.
IEEE, (2013)
97. Derawi, M.O., McCallum, S., Witte, H., Bours, P.: Biometric access control using Near Field Communication and
smart phones. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 490-497. (2012)
98. Dharavath, K., Talukdar, F.A., Laskar, R.H.: Facial image processing in conjunction with password for intelligent
access control. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. (2016)
99. Di Pietro, R., Me, G., Strangio, M.A.: A two-factor mobile authentication scheme for secure financial transactions.
In: 4th Annual International Conference on Mobile Business, ICMB 2005, pp. 28-34. (2005)
100. Diaconu, A.V.: Passcode based authentication protocol: Part I — Solution evaluation and software design. In:
Electrical and Electronics Engineering (ISEEE), 2010 3rd International Symposium on, pp. 204-210. (2010)
101. Diaz-Tellez, Y.H., Bodanese, E.L., Dimitrakos, T., Turner, M.: Context-Aware Multifactor Authentication Based on
Dynamic Pin. In: IFIP International Information Security Conference, pp. 330-338. Springer, (2014)
102. Eldefrawy, M.H., Alghathbar, K., Khan, M.K.: OTP-based two-factor authentication using mobile phones. In:
Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pp.
327-331. (2011)
103. Eldefrawy, M.H., Khan, M.K., Alghathbar, K., Kim, T.H., Elkamchouchi, H.: Mobile one-time passwords: Two-
factor authentication using mobile phones. Security and Communication Networks 5, 508-516 (2012)
104. Eldefrawy, M.H., Khan, M.K., Elkamchouchi, H.: The Use of Two Authentication Factors to Enhance the Security of
Mass Storage Devices. In: 11th International Conference on Information Technology: New Generations (ITNG),
2014, pp. 196-200. (2014)
105. Eminaʇaoʇlu, M., Çini, E., Sert, G., Zor, D.: A two-factor authentication system with QR codes for web and mobile
applications. In: Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014, pp.
105-112. (2014)
106. Esiner, E., Datta, A.: Layered security for storage at the edge: on decentralized multi-factor access control.
Proceedings of the 17th International Conference on Distributed Computing and Networking. ACM, Singapore,
Singapore (2016)
107. Fan, C.-I., Lin, Y.-H., Hsu, R.-H.: NIS03-6: Remote Password Authentication Scheme with Smart Cards and
Biometrics. In: IEEE Globecom 2006, pp. 1-5. IEEE, (2006)
108. Fan, C.I., Lin, Y.H.: Provably secure remote truly three-factor authentication scheme with privacy protection on
biometrics. IEEE Transactions on Information Forensics and Security 4, 933-945 (2009)
109. Fan, L., Li, J.-H., Zhu, H.-W.: An enhancement of timestamp-based password authentication scheme. Computers &
Security 21, 665-667 (2002)
110. Fathi, R., Salehi, M.A., Leiss, E.L.: User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud
Services. In: 2015 IEEE 8th International Conference on Cloud Computing, pp. 516-523. (2015)
111. Fleischhacker, N., Manulis, M., Azodi, A.: A modular framework for multi-factor authentication and key exchange.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 8893, pp. 190-214 (2014)
112. Fujii, H., Shigematsu, N., Kurokawa, H., Nakagawa, T.: Telelogin: A two-factor two-path authentication technique
using caller ID. NTT Technical Review 6, (2008)
113. Fujii, H., Tsuruoka, Y.: SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. In:
2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 283-287.
(2013)
114. Fujii, H., Tsuruoka, Y.: Three-factor user authentication method using biometrics challenge response. Lecture Notes
in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 7859 LNCS, pp. 395-396 (2013)
115. Go, W., Lee, K., Kwak, J.: Construction of a secure two-factor user authentication system using fingerprint
information and password. Journal of Intelligent Manufacturing 25, 217-230 (2014)
116. Goriparthi, T., Lal Das, M., Saxena, A.: An improved bilinear pairing based remote user authentication scheme.
Computer Standards & Interfaces 31, 181-185 (2009)
117. Griffin, P.H.: Biometric Knowledge Extraction for Multi-factor Authentication and Key Exchange. In: Procedia
Computer Science, pp. 66-71. (2015)
118. Griffin, P.H.: Telebiometric authentication objects. In: Procedia Computer Science, pp. 393-400. (2014)
119. Guo, M.H., Liaw, H.T., Deng, D.J., Chao, H.C.: An RFID secure authentication mechanism in WLAN. Computer
Communications 34, 236-240 (2011)
120. Gyorffy, J.C., Tappenden, A.F., Miller, J.: Token-based graphical password authentication. International Journal of
Information Security 10, 321-336 (2011)
121. Haar, D.v.d.: CaNViS: A cardiac and neurological-based verification system that uses wearable sensors. In: Third
International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 2015, pp.
99-104. (2015)
122. Hafizul Islam, S.K., Biswas, G.P.: Dynamic ID-based remote user mutual authentication scheme with smartcard
using Elliptic Curve Cryptography. Journal of Electronics (China) 31, 473-488 (2014)
123. Hahn, C., Kwon, H., Kim, D., Hur, J.: Enhanced authentication for outsourced educational contents through provable
block possession. Multimedia Tools and Applications (2015)
124. Hao, Z., Yu, N.: A security enhanced remote password authentication scheme using smart card. In: Data, Privacy and
E-Commerce (ISDPE), 2010 Second International Symposium on, pp. 56-60. IEEE, (2010)
125. Harini, N., Padmanabhan, T.: 2CAuth: A new two factor authentication scheme using QR-code. International Journal
of Engineering and Technology 5, 1087-1094 (2013)
126. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java
SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010)
127. Hayashi, E., Das, S., Amini, S., Hong, J., Oakley, I.: CASA: context-aware scalable authentication. Proceedings of
the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United Kingdom (2013)
128. He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user Authentication Scheme in Wireless Sensor
Networks. Ad-Hoc and Sensor Wireless Networks 10, 361-371 (2010)
129. He, D., Kumar, N., Khan, M.K., Lee, J.h.: Anonymous two-factor authentication for consumer roaming service in
global mobility networks. IEEE Transactions on Consumer Electronics 59, 811-817 (2013)
130. He, D., Kumar, N., Lee, J.H., Sherratt, R.S.: Enhanced three-factor security protocol for consumer USB mass storage
devices. IEEE Transactions on Consumer Electronics 60, 30-37 (2014)
131. He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless
communications. Computer Communications 34, 367-374 (2011)
132. He, W., Peng, X., Meng, X., Liu, X.: Two-factor authentication system based on optical interference and one-way
Hash function. In: Proceedings of SPIE - The International Society for Optical Engineering. (2012)
133. Holz, C., Bentley, F.R.: On-Demand Biometrics: Fast Cross-Device Authentication. Proceedings of the 2016 CHI
Conference on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016)
134. Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for
multi-server environment. Computer Standards and Interfaces 31, 1118-1123 (2009)
135. Hsiang, H.-C., Shih, W.-K.: Weaknesses and improvements of the Yoon–Ryu–Yoo remote user authentication
scheme using smart cards. Computer Communications 32, 649-652 (2009)
136. Hsiao, T.-C., Liao, Y.-T., Huang, J.-Y., Chen, T.-S., Horng, G.-B.: An Authentication Scheme to Healthcare Security
under Wireless Sensor Networks. Journal of Medical Systems 36, 3649-3664 (2012)
137. Hsieh, W.B., Leu, J.S.: A robust user authentication scheme using dynamic identity in wireless sensor networks.
Wireless Personal Communications 77, 979-989 (2014)
138. Hsieh, W.-B., Leu, J.-S.: An anonymous mobile user authentication protocol using self-certified public keys based on
multi-server architectures. The Journal of Supercomputing 70, 133-148 (2014)
139. Hsieh, W.-B., Leu, J.-S.: Exploiting hash functions to intensify the remote user authentication scheme. Computers &
Security 31, 791-798 (2012)
140. Hu, J.Y., Sueng, C.C., Liao, W.H., Ho, C.C.: Android-based mobile payment service protected by 3-factor
authentication and virtual private ad hoc networking. In: Computing, Communications and Applications Conference
(ComComAp), 2012, pp. 111-116. (2012)
141. Huang, B., Khan, M.K., Wu, L., Muhaya, F.T.B., He, D.: An Efficient Remote User Authentication with Key
Agreement Scheme Using Elliptic Curve Cryptography. Wireless Personal Communications 85, 225-240 (2015)
142. Huang, H.F., Chang, Y.F., Liu, C.H.: Enhancement of two-factor user authentication in wireless sensor networks. In:
Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal
Processing, IIHMSP 2010, pp. 27-30. (2010)
143. Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication:
Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 22,
1390-1397 (2011)
144. Huseynov, E., Seigneur, J.M.: WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts. In:
Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, K-2015 - Academic Conference.
(2015)
145. Hwang, M.-S., Chong, S.-K., Chen, T.-Y.: DoS-resistant ID-based password authentication scheme using smart
cards. Journal of Systems and Software 83, 163-172 (2010)
146. Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: A simple remote user authentication scheme. Mathematical and Computer
Modelling 36, 103-107 (2002)
147. Hwang, M.-S., Li, L.-H., Lee, C.-C.: A key authentication scheme with non-repudiation. SIGOPS Oper. Syst. Rev.
38, 75-78 (2004)
148. Indu, S., Sathya, T.N., Saravana Kumar, V.: A stand-alone and SMS-based approach for authentication using mobile
phone. In: 2013 International Conference on Information Communication and Embedded Systems, ICICES 2013, pp.
140-145. (2013)
149. Islam, S.: Design and analysis of an improved smartcard‐based remote user password authentication scheme.
International Journal of Communication Systems (2014)
150. Islam, S.H., Khan, M.K.: Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for
Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-16 (2014)
151. Islam, S.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended
chaotic maps. Nonlinear Dynamics 78, 2261-2276 (2014)
152. Islam, S.K.H., Biswas, G.P.: Cryptanalysis and improvement of a password-based user authentication scheme for the
integrated EPR information system. Journal of King Saud University - Computer and Information Sciences 27, 211-
221 (2015)
153. Jayasudha, A.C.: Two factor authenticated cash withdrawal using mobile phones and apprehend insecure users within
the ATM centre. Contemporary Engineering Sciences 7, 449-455 (2014)
154. Jeong, Y.S., Park, J.S., Park, J.H.: An efficient authentication system of smart device using multi factors in mobile
cloud service architecture. International Journal of Communication Systems 28, 659-674 (2015)
155. Jiang, L., Li, X., Guo, D.: Mutual password authentication with key agreement and user anonymity for cloud storage.
Journal of Computers (Taiwan) 27, 12-25 (2016)
156. Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-Health
clouds. Journal of Supercomputing 1-24 (2016)
157. Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart‐card‐based password authentication scheme.
International Journal of Communication Systems 28, 383-393 (2015)
158. Jiang, Q., Ma, J., Li, G., Yang, L.: Robust two-factor authentication and key agreement preserving user privacy.
International Journal of Network Security 16, 229-240 (2014)
159. Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless
sensor networks. Peer-to-Peer Networking and Applications 8, 1070-1081 (2014)
160. Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong
anonymity for telecare medicine information systems. Journal of Medical Systems 38, (2014)
161. Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor
authentication scheme preserving biometric template privacy. Nonlinear Dynamics 83, 2085-2101 (2016)
162. Jiang, R., Pan, L., Li, J.-H.: Further analysis of password authentication schemes based on authentication tests.
Computers & Security 23, 469-477 (2004)
163. Jiang, W.q., Huang, Z.q., Yang, Y.x., Tian, J., Li, L.: ID-based authentication scheme combined with identity-based
encryption with fingerprint hashing. Journal of China Universities of Posts and Telecommunications 15, 75-"80,120"
(2008)
164. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two factor authentication featuring fingerprint data and tokenised
random number. Pattern Recognition 37, 2245-2255 (2004)
165. Johnson, B., Maillart, T., Chuang, J.: My thoughts are not your thoughts. In: UbiComp 2014 - Adjunct Proceedings
of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 1329-1338. (2014)
166. Juang, W.-S., Wu, J.-L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs.
Computers & Electrical Engineering 35, 33-40 (2009)
167. Juang, W.-S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on
Consumer Electronics 50, 251-255 (2004)
168. Jun, E.-A., Ji, J.D., Lim, J., Jung, S.W.: Improved remote user authentication scheme using bilinear pairings.
Proceedings of the 2009 International Conference on Hybrid Information Technology. ACM, Daejeon, Korea (2009)
169. Jung, J., Lee, D., Kim, J., Lee, Y., Kang, D., Won, D.: Cryptanalysis and Improvement of Efficient Password-Based
User Authentication Scheme using Hash Function. Proceedings of the 10th International Conference on Ubiquitous
Information Management and Communication. ACM, Danang, Viet Nam (2016)
170. Kalra, S., Sood, S.: Advanced remote user authentication protocol for multi-server architecture based on ECC.
Journal of Information Security and Applications 18, 98-107 (2013)
171. Kalra, S., Sood, S.K.: Advanced password based authentication scheme for wireless sensor networks. Journal of
Information Security and Applications 20, 37-46 (2015)
172. Kalsoom, S., Ziauddin, S.: Cryptanalysis and improvement of a two-factor user authentication scheme providing
mutual authentication and key agreement over insecure channels. International Journal of Machine Learning and
Computing 3, 400 (2013)
173. Kanade, S., Camara, D., Krichen, E., Petrovska-Delacrétaz, D., Dorizzi, B.: Three factor scheme for biometric-based
cryptographic key regeneration using iris. In: Biometrics Symposium, 2008. BSYM'08, pp. 59-64. IEEE, (2008)
174. Kang, J., Nyang, D., Lee, K.: Two factor face authentication scheme with cancelable feature. Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 3781 LNCS, pp. 67-76 (2005)
175. Kang, J., Nyang, D., Lee, K.: Two-factor face authentication using matrix permutation transformation and a user
password. Information Sciences 269, 1-20 (2014)
176. Karapanos, N., Marforio, C., Soriente, C., Capkun, S.: Sound-proof: Usable two-factor authentication based on
ambient sound. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 483-498. (2015)
177. Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. Journal of
Information Security and Applications 19, 282-294 (2014)
178. Kathrine, G.J.W., Kirubakaran, E.: Four-factor based privacy preserving biometric authentication and authorization
scheme for enhancing grid security. Int J Comput Appl 30, 13-20 (2011)
179. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless
sensor networks’. Sensors 10, 2450-2459 (2010)
180. Khan, M.K., Kim, S.-K., Alghathbar, K.: Cryptanalysis and security enhancement of a ‘more efficient & secure
dynamic ID-based remote user authentication scheme’. Computer Communications 34, 305-309 (2011)
181. Khan, M.K., Kumari, S., Gupta, M.K.: More efficient key-hash based fingerprint remote authentication scheme using
mobile device. Computing 96, 793-816 (2014)
182. Khan, M.K., Kumari, S.: An Authentication Scheme for Secure Access to Healthcare Services. Journal of Medical
Systems 37, 1-12 (2013)
183. Khan, M.K., Kumari, S.: Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID‐based
Authentication Scheme for Telecare Medical Information Systems”. Security and Communication Networks 7, 399-
408 (2014)
184. Khan, M.K., Zhang, J., Wang, X.: Chaotic hash-based fingerprint biometric remote user authentication scheme on
mobile devices. Chaos, Solitons & Fractals 35, 519-524 (2008)
185. Khan, M.K., Zhang, J.: Improving the security of ‘a flexible biometrics remote user authentication scheme’.
Computer Standards & Interfaces 29, 82-85 (2007)
186. Khan, M.K.: Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic
world. IETE Technical Review 26, 191-195 (2009)
187. Khan, S.H., Akbar, M.A.: Multi-Factor Authentication on Cloud. In: 2015 International Conference on Digital Image
Computing: Techniques and Applications, DICTA 2015. (2015)
188. Khan, S.H., Ali Akbar, M., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor
authentication. Pattern Recognition 48, 458-472 (2015)
189. Kim, A., Gyeonghyeon, P., Youjung, S., Lee, S.H.: A non-memorization bio-password scheme with confidence
interval sets. In: 2013 International Conference on ICT Convergence (ICTC), pp. 1102-1106. (2013)
190. Kim, A.Y., Lee, S.H.: Authentication Protocol using Fuzzy Eigenface Vault based on MoC. In: The 9th International
Conference on Advanced Communication Technology, pp. 1771-1775. (2007)
191. Kim, H.-S., Lee, S.-W., Yoo, K.-Y.: ID-based password authentication scheme using smart cards and fingerprints.
SIGOPS Oper. Syst. Rev. 37, 32-41 (2003)
192. Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual
authentication with key agreement in wireless sensor networks. Sensors 14, 6443-6462 (2014)
193. Kim, K.-W., Jeon, J.-C., Yoo, K.-Y.: Efficient and secure password authentication schemes for low-power devices.
International Journal of Sensor Networks 2, 77-81 (2007)
194. Kim, S.H., Choi, D., Jin, S.H., Lee, S.H.: Geo-location based QR-code authentication scheme to defeat active real-
time phishing attack. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 51-
61. (2013)
195. Kolhe, V., Gunjal, V., Kalasakar, S., Rathod, P.: Secure Authentication with 3D Password. International Journal Of
Engineering Science And Innovative Technology (IJESIT) (2013)
196. Ku, Y., Choi, O., Kim, K., Shon, T., Hong, M., Yeh, H., Kim, J.H.: Two-factor authentication system based on
extended OTP mechanism. International Journal of Computer Mathematics 90, 2515-2529 (2013)
197. Kumar, A.S., Girish, K.P.: A three factor authentication system for smartcard using biometric, Visual cryptography
and otp. Advances in Intelligent Systems and Computing, vol. 324, pp. 673-679 (2015)
198. Kumar, M., Gupta, M.K., Kumari, S.: An Improved Efficient Remote Password Authentication Scheme with Smart
Card over Insecure Networks. IJ Network Security 13, 167-177 (2011)
199. Kumar, P., Choudhury, A.J., Sain, M., Lee, S.-G., Lee, H.-J.: RUASN: a robust user authentication framework for
wireless sensor networks. Sensors 11, 5020-5046 (2011)
200. Kumar, P., Lee, S.G., Lee, H.J.: A user authentication for healthcare application using wireless medical sensor
networks. In: Proc.- 2011 IEEE International Conference on HPCC 2011 - 2011 IEEE International Workshop on
FTDCS 2011 -Workshops of the 2011 Int. Conf. on UIC 2011- Workshops of the 2011 Int. Conf. ATC 2011, pp.
647-652. (2011)
201. Kumar, P., Sain, M., Lee, H.J.: An efficient two-factor user authentication framework for wireless sensor networks.
In: 13th International Conference on Advanced Communication Technology (ICACT), 2011, pp. 574-578. (2011)
202. Kumari, S., Khan, M.K., Li, X.: A more secure digital rights management authentication scheme based on smart
card. Multimedia Tools and Applications 75, 1135-1158 (2016)
203. Kumari, S., Khan, M.K., Li, X.: An improved remote user authentication scheme with key agreement. Computers &
Electrical Engineering 40, 1997-2012 (2014)
204. Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password
authentication scheme'. International Journal of Communication Systems 27, 3939-3955 (2014)
205. Kumari, S., Khan, M.K.: More secure smart card‐based remote user password authentication scheme with user
anonymity. Security and Communication Networks 7, 2039-2053 (2014)
206. Kumari, S., Li, X., Wu, F., Das, A.K., Arshad, H., Khan, M.K.: A user friendly mutual authentication and key
agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems (2016)
207. Kumari, S., Wu, F., Li, X., Farash, M.S., Jiang, Q., Khan, M.K., Das, A.K.: Single round-trip SIP authentication
scheme with provable security for Voice over Internet Protocol using smart card. Multimedia Tools and Applications
1-31 (2015)
208. Lai, W.K., Tan, B.G., Soo, M.S., Khan, I.: Two-factor user authentication with the CogRAM weightless neural net.
In: 2014 International Joint Conference on Neural Networks (IJCNN), pp. 3751-3758. (2014)
209. Laptikultham, S., Tritilanunt, S.: Modeling and analysis of two-factor authentication protocol for USB digital
evidence acquisition devices. In: Proceedings of the 2015 12th International Joint Conference on Computer Science
and Software Engineering, JCSSE 2015, pp. 241-246. (2015)
210. Le, H.D., Chang, C.C., Chou, Y.C.: A novel untraceable authentication scheme for mobile roaming in GLOMONET.
International Journal of Network Security 17, 395-404 (2015)
211. Lee, C.C., Chen, C.T., Wu, P.H., Chen, T.Y.: Three-factor control protocol based on elliptic curve cryptosystem for
universal serial bus mass storage devices. IET Computers and Digital Techniques 7, 48-55 (2013)
212. Lee, C.-C., Hsu, C.-W.: A secure biometric-based remote user authentication with key agreement scheme using
extended chaotic maps. Nonlinear Dynamics 71, 201-211 (2013)
213. Lee, K.: A study on user access control method using multi-factor authentication for EDMS. International Journal of
Security and its Applications 7, 327-334 (2013)
214. Lee, S., Ong, I., Lim, H.-T., Lee, H.-J.: Two factor authentication for cloud computing. Journal of information and
communication convergence engineering 8, 427-432 (2010)
215. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Efficient nonce-based remote user authentication scheme using smart cards.
Applied Mathematics and Computation 167, 355-361 (2005)
216. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improvement of Chien et al.'s remote user authentication scheme using smart
cards. Computer Standards & Interfaces 27, 181-183 (2005)
217. Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C.: A Secure and Efficient Password-Based User Authentication
Scheme Using Smart Cards for the Integrated EPR Information System. Journal of Medical Systems 37, 1-7 (2013)
218. Lee, T.-F., Liu, C.-M.: A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare
Medicine Information Systems. Journal of Medical Systems 37, 1-8 (2013)
219. Lee, Y., Yang, H., Won, D.: Attacking and improving on Lee and Chiu's authentication scheme using smart cards.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 6047 LNCS, pp. 377-385 (2010)
220. Lee, Y.-C., Hsieh, Y.-C., Lee, P.-J., You, P.-S.: Improvement of the ElGamal Based Remote Authentication Scheme
Using Smart Cards. Journal of Applied Research and Technology 12, 1063-1072 (2014)
221. Lee, Y.C.: Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme. Journal of Applied
Research and Technology 11, 597-603 (2013)
222. Li, C., Qi, J.: A two-factor authentication design of fingerprint recognition system based on DSP and RF card. In:
2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010, pp. 441-445.
(2010)
223. Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smart cards. Journal
of Network and Computer Applications 33, 1-5 (2010)
224. Li, C.-T., Lee, C.-C., Lee, C.-W.: An improved two-factor user authentication protocol for wireless sensor networks
using elliptic curve cryptography. Sensor Letters 11, 958-965 (2013)
225. Li, C.T., Lee, C.C., Wang, L.J., Liu, C.J.: A secure billing service with two-factor user authentication in wireless
sensor networks. International Journal of Innovative Computing, Information and Control 7, 4821-4831 (2011)
226. Li, C.-T., Lee, C.-C., Weng, C.-Y., Fan, C.-I.: An Extended Multi-Server-Based User Authentication and Key
Agreement Scheme with User Anonymity. KSII Transactions on Internet & Information Systems 7, (2013)
227. Li, C.-T., Lee, C.-C., Weng, C.-Y.: A Secure Chaotic Maps and Smart Cards Based Password Authentication and
Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. Journal of Medical
Systems 38, 1-11 (2014)
228. Li, C.-T., Lee, C.-C., Weng, C.-Y.: An extended chaotic maps based user authentication and privacy preserving
scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics 74, 1133-
1143 (2013)
229. Li, C.T., Weng, C.Y., Fan, C.I.: Two-factor user authentication in multi-server networks. International Journal of
Security and its Applications 6, 261-268 (2012)
230. Li, C.T., Weng, C.Y., Lee, C.C., Chin-Wen, L.: Towards secure and dynamic password based user authentication
scheme in hierarchical wireless sensor networks. International Journal of Security and its Applications 7, 249-258
(2013)
231. Li, C.-T., Weng, C.-Y., Lee, C.-C., Wang, C.-C.: A Hash Based Remote User Authentication and Authenticated Key
Agreement Scheme for the Integrated EPR Information System. Journal of Medical Systems 39, 1-11 (2015)
232. Li, C.-T., Weng, C.-Y., Lee, C.-C., Wang, C.-C.: Secure User Authentication and User Anonymity Scheme based on
Quadratic Residues for the Integrated EPRIS. Procedia Computer Science 52, 21-28 (2015)
233. Li, C.-T., Weng, C.-Y., Lee, C.-C.: An advanced temporal credential-based security scheme with mutual
authentication and key agreement for wireless sensor networks. Sensors 13, 9589-9603 (2013)
234. Li, C.T.: A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart
card. IET Information Security 7, 3-10 (2013)
235. Li, C.T.: Secure smart card based password authentication scheme with user anonymity. Information Technology and
Control 40, 157-162 (2011)
236. Li, F., Liu, Q., Pang, L., Pei, Q.: Identity Authentication Based on Fuzzy Vault and Digital Certificate. In:
International Conference on Computational Intelligence and Security (CIS), 2010, pp. 441-445. (2010)
237. Li, H., Hu, L., Yuan, W., Chu, J.: Attacking and improving of Das's authentication scheme in wireless sensor
networks. Journal of Convergence Information Technology 7, 396-403 (2012)
238. Li, T., Jin, Z.: A New Low Cost One Time ID and Password Authentication Protocol Using Popular Removable
Storage Devices. In: Second International Conference on Intelligent Networks and Intelligent Systems, 2009. ICINIS
'09., pp. 213-216. (2009)
239. Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication
scheme for multi-server environments. Mathematical and Computer Modelling 58, 85-95 (2013)
240. Li, X., Niu, J., Khan, M.K., Liao, J., Zhao, X.: Robust three‐factor remote user authentication scheme with key
agreement for multimedia systems. Security and Communication Networks (2014)
241. Li, X., Niu, J., Khan, M.K., Liao, J.: Robust Biometrics Based Three-Factor Remote User Authentication Scheme
with Key Agreement. In: Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, pp.
105-110. (2013)
242. Li, X., Niu, J., Khurram Khan, M., Liao, J.: An enhanced smart card based remote user password authentication
scheme. Journal of Network and Computer Applications 36, 1365-1371 (2013)
243. Li, X., Niu, J., Kumari, S., Islam, S.H., Wu, F., Khan, M.K., Das, A.K.: A Novel Chaotic Maps-Based User
Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wireless
Personal Communications 89, 569-597 (2016)
244. Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three-factor remote user authentication scheme
with key agreement. Security and Communication Networks 7, 1488-1497 (2014)
245. Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three‐factor remote user authentication scheme
with key agreement. Security and Communication Networks 7, 1488-1497 (2014)
246. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: A biometric-based password authentication with key exchange scheme
using mobile device for multi-server environment. Applied Mathematics and Information Sciences 9, 1123-1137
(2015)
247. Li, X., Wen, Q., Li, W.: A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic
Security and Personal Privacy for Wireless Communications. Wireless Personal Communications 86, 1593-1610
(2016)
248. Li, X., Zhang, Y.: A simple and robust anonymous two‐factor authenticated key exchange protocol. Security and
Communication Networks 6, 711-722 (2013)
249. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: Security enhancement for a dynamic ID-based remote user authentication
scheme. In: International Conference on Next Generation Web Services Practices (NWeSP'05), pp. 4 pp. IEEE,
(2009)
250. Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards.
Mathematical and Computer Modelling 44, 223-228 (2006)
251. Lin, C.-H., Lai, Y.-Y.: A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces
27, 19-23 (2004)
252. Lin, H.-Y.: On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information
Systems. Journal of Medical Systems 37, 1-5 (2013)
253. Lin, X., Huafei, Z., Ho, P.H., Shen, X.: Two-Factor Localized Authentication Scheme for WLAN Roaming. In: 2007
IEEE International Conference on Communications, pp. 1172-1178. (2007)
254. Lin, Y., Wang, K., Zhang, B., Liu, Y., Li, X.: An enhanced biometric-based three factors user authentication scheme
for multi-server environments. International Journal of Security and its Applications 10, 315-328 (2016)
255. Liou, J.C., Bhashyam, S.: A feasible and cost effective two-factor authentication for online transactions. In: 2nd
International Conference on Software Engineering and Data Mining, SEDM 2010, pp. 47-51. (2010)
256. Liou, J.-C., Bhashyam, S.: On Improving Feasibility and Security Measures of Online Authentication. Int. J. Adv.
Comp. Techn. 2, 6-16 (2010)
257. Liou, J.C., Egan, G., Patel, J.K., Bhashyam, S.: A sophisticated RFID application on multi-factor authentication. In:
Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pp.
180-185. (2011)
258. Liu, C.-H., Chung, Y.-F.: Secure user authentication scheme for wireless healthcare sensor networks. Computers &
Electrical Engineering (2016)
259. Liu, C.-L., Tsai, C.-J., Chang, T.-Y., Tsai, W.-J., Zhong, P.-K.: Implementing multiple biometric features for a recall-
based graphical keystroke dynamics authentication system on a smart phone. Journal of Network and Computer
Applications 53, 128-139 (2015)
260. Liu, F.: Efficient two-factor authentication protocol using password and smart card. Journal of Computers (Finland)
8, 3257-3263 (2013)
261. Liu, H., Zhang, Y.: An improved one-time password authentication scheme. In: International Conference on
Communication Technology Proceedings, ICCT, pp. 1-5. (2013)
262. Liu, J.K., Au, M.H., Huang, X., Lu, R., Li, J.: Fine-Grained Two-Factor Access Control for Web-Based Cloud
Computing Services. IEEE Transactions on Information Forensics and Security 11, 484-497 (2016)
263. Liu, W., Uluagac, A.S., Beyah, R.: MACA: A privacy-preserving multi-factor cloud authentication system utilizing
big data. In: Proceedings - IEEE INFOCOM, pp. 518-523. (2014)
264. Liu, W., Xie, Q., Wang, S., Hu, B.: An improved authenticated key agreement protocol for telecare medicine
information system. SpringerPlus 5, 1-16 (2016)
265. Liu, X., Cheung, Y.M.: Learning multi-boosted HMMs for lip-password based speaker verification. IEEE
Transactions on Information Forensics and Security 9, 233-246 (2014)
266. Liu, Y., Wei, F., Ma, C.: Multi-factor authenticated key exchange protocol in the three-party setting. Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 6584 LNCS, pp. 255-267 (2011)
267. Lu, Y., Li, L., Peng, H., Xie, D., Yang, Y.: Robust and Efficient Biometrics Based Password Authentication Scheme
for Telecare Medicine Information Systems Using Extended Chaotic Maps. Journal of Medical Systems 39, 1-10
(2015)
268. Lu, Y., Li, L., Peng, H., Yang, Y.: An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine
Information Systems Using Elliptic Curve Cryptosystem. Journal of Medical Systems 39, 1-8 (2015)
269. Lu, Y.F., Lin, P.H., Ye, S.S., Wang, R.S., Chou, S.C.: A strong authentication with key agreement scheme for web-
based collaborative systems. In: ISPACS 2012 - IEEE International Symposium on Intelligent Signal Processing and
Communications Systems, pp. 343-348. (2012)
270. Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it's you!: implicit
authentication based on touch screen patterns. Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems. ACM, Austin, Texas, USA (2012)
271. Mali, P., Salunke, S., Mane, R., Khatavkar, P.: Multilevel ATM Security Based On Two Factor Biometrics. In:
International Journal of Engineering Research and Technology. ESRSA Publications, (2012)
272. Mann, C., Loebenberger, D.: Two-factor authentication for the Bitcoin protocol. International Journal of Information
Security 1-14 (2016)
273. Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted
computer. In: International Conference on Financial Cryptography and Data Security, pp. 88-103. Springer, (2007)
274. Mathew, H.M., Raj, S.B.E., Gundapu, P.S.J., Angeline, S.J.F.: An improved three-factor authentication scheme using
smart card with biometric privacy protection. In: ICECT 2011 - 2011 3rd International Conference on Electronics
Computer Technology, pp. 220-223. (2011)
275. Maxion, R.A., Killourhy, K.S.: Keystroke biometrics with number-pad input. In: Proceedings of the International
Conference on Dependable Systems and Networks, pp. 201-210. (2010)
276. Mir, O., van der Weide, T., Lee, C.-C.: A Secure User Anonymity and Authentication Scheme Using AVISPA for
Telecare Medical Information Systems. Journal of Medical Systems 39, 1-16 (2015)
277. Miranda, L.H.F.M.: Context-aware multi-factor authentication. Faculdade de Ciências e Tecnologia (2009)
278. Mirkovic, J., Bryhni, H., Ruland, C.M.: Secure solution for mobile access to patient's health care record. In: 13th
IEEE International Conference on e-Health Networking Applications and Services (Healthcom), 2011, pp. 296-303.
IEEE, (2011)
279. Misbahuddin, M., Premchand, P., Govardhan, A.: A user friendly password authenticated key agreement for multi
server environment. Proceedings of the International Conference on Advances in Computing, Communication and
Control. ACM, Mumbai, India (2009)
280. Mishra, D., Chaturvedi, A., Mukhopadhyay, S.: Design of a lightweight two-factor authentication scheme with smart
card revocation. Journal of Information Security and Applications 23, 44-53 (2016)
281. Mishra, D., Das, A.K., Chaturvedi, A., Mukhopadhyay, S.: A secure password-based authentication and key
agreement scheme using smart cards. Journal of Information Security and Applications 23, 28-43 (2015)
282. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving biometric-based multi-server
authenticated key agreement scheme using smart cards. Expert Systems with Applications 41, 8129-8143 (2014)
283. Mishra, D., Srinivas, J., Mukhopadhyay, S.: A Secure and Efficient Chaotic Map-Based Authenticated Key
Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-10 (2014)
284. Mohammed, M.M., Elsadig, M.: A multi-layer of multi factors authentication model for online banking services. In:
International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), 2013, pp. 220-224.
(2013)
285. Moon, J., Yu, J., Yang, H., Won, D.: Improvement of Biometrics and Smart Cards-based Authentication Scheme for
Multi-Server Environments. Proceedings of the 10th International Conference on Ubiquitous Information
Management and Communication. ACM, Danang, Viet Nam (2016)
286. Mtonga, K., Yoon, E.J., Kim, H.: A Pairing Based Authentication and Key Establishment Scheme for Remote Patient
Monitoring Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and
Telecommunications Engineering, LNICST, vol. 135 LNICST, pp. 79-89 (2014)
287. Mueller, R., Sanchez-Reillo, R.: An approach to biometric identity management using low-cost equipment. In: IIH-
MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,
pp. 1096-1100. (2009)
288. Munch-Ellingsen, A., Karlsen, R., Andersen, A., Akselsen, S.: Two-factor authentication for android host card
emulated contactless cards. In: 2015 1st Conference on Mobile and Secure Services, MOBISECSERV 2015. (2015)
289. Muniyandi, A.P., Ramasamy, R., Indrani: Password based remote authentication scheme using ECC for smart card.
Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, Rourkela,
Odisha, India (2011)
290. Nag, A.K., Dasgupta, D., Deb, K.: An adaptive approach for active multi-factor authentication. In: 9th Annual
Symposium on Information Assurance (ASIA’14), pp. 39. (2014)
291. Nag, A.K., Dasgupta, D.: An adaptive approach for continuous multi-factor authentication in an identity eco-system.
In: ACM International Conference Proceeding Series, pp. 65-68. (2014)
292. Nag, A.K., Roy, A., Dasgupta, D.: An Adaptive Approach Towards the Selection of Multi-Factor Authentication. In:
Computational Intelligence, 2015 IEEE Symposium Series on, pp. 463-472. IEEE, (2015)
293. Nagaraju, S., Parthiban, L.: SecAuthn: Provably secure multi-factor authentication for the cloud computing systems.
Indian Journal of Science and Technology 9, (2016)
294. Nam, J., Choo, K.-K.R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication
in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Plos one 10, e0116709
(2015)
295. Nanjing, C.: Advanced secure user authentication framework for cloud computing. (2013)
296. Narhar, U.K., Joshi, R.B.: Highly secure authentication scheme. In: Proceedings - 1st International Conference on
Computing, Communication, Control and Automation, ICCUBEA 2015, pp. 270-274. (2015)
297. Nematollahi, M.A., Gamboa-Rosales, H., Martinez-Ruiz, F.J., de la Rosa-Vargas, J.I., Al-Haddad, S.A.R.,
Esmaeilpour, M.: Multi-factor authentication model based on multipurpose speech watermarking and online speaker
recognition. Multimedia Tools and Applications 1-31 (2016)
298. Nguyen, N.T., Le, H.D., Chang, C.C.: Provably secure and efficient three-factor authenticated key agreement scheme
with untraceability. International Journal of Network Security 18, 335-344 (2016)
299. Ntantogian, C., Malliaros, S., Xenakis, C.: Gaithashing: A two-factor authentication scheme based on gait features.
Computers and Security 52, 17-32 (2015)
300. Odelu, V., Das, A.K., Goswami, A.: An efficient ECC-based privacy-preserving client authentication protocol with
key agreement using smart card. Journal of Information Security and Applications 21, 1-19 (2015)
301. Omar, M., Din, R., Tahir, H.: Smart cards and the fingerprint: A framework for user identification and authentication.
Journal of ICT (2003)
302. Pang, Y.-H., J., A.T.B., L, D.N.C.: Two-Factor Cancelable Biometrics Authenticator. Journal of Computer Science
and Technology 22, 54-59 (2007)
303. Panjwani, S., Cutrell, E.: Usably secure, low-cost authentication for mobile banking. Proceedings of the Sixth
Symposium on Usable Privacy and Security. ACM, Redmond, Washington, USA (2010)
304. Park, H., Redford, S.: Client certificate and IP address based multi-factor authentication for J2EE web applications.
In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, CASCON
'07, pp. 167-174. (2007)
305. Park, H.J.: Enhanced user authentication scheme for wireless sensor networks. International Journal of Security and
its Applications 9, 367-374 (2015)
306. Part, Lee, Y., Won, D.: Enhancing of a password-based authentication scheme using smart cards. Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 5871 LNCS, pp. 879-886 (2009)
307. Patel, S.N., Pierce, J.S., Abowd, G.D.: A gesture-based authentication scheme for untrusted public terminals. In:
Proceedings of the 17th annual ACM symposium on User interface software and technology, pp. 157-160. ACM,
(2004)
308. Pham, T., Ma, W., Tran, D., Nguyen, P., Phung, D.: Multi-factor EEG-based user authentication. In: Proceedings of
the International Joint Conference on Neural Networks, pp. 4029-4034. (2014)
309. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: A novel smart card mutual authentication scheme for session transfer among
registered devices. In: Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013,
pp. 1540-1547. (2013)
310. Polakis, I., Ilia, P., Maggi, F., Lancini, M., Kontaxis, G., Zanero, S., Ioannidis, S., Keromytis, A.D.: Faces in the
distorting mirror: Revisiting photo-based social authentication. In: Proceedings of the ACM Conference on Computer
and Communications Security, pp. 501-512. (2014)
311. Pooja, D., Shilpi, G., Sujata, S., Vinita, G.: SECURED AUTHENTICATION: 3D PASSWORD‖. International
Journal of Engineering and Management Sciences 3, 242-245 (2012)
312. Portnoi, M., Shen, C.C.: Loc-Auth: Location-enabled authentication through attribute-based encryption. In:
International Conference on Computing, Networking and Communications (ICNC), 2015, pp. 89-93. (2015)
313. Priyadharshini, S., Nivetha, D., Anjalikumari, T., Prakash, P.: Mobile controlled door locking system with two-factor
authentication. Advances in Intelligent Systems and Computing, vol. 398, pp. 133-139 (2016)
314. Pu, Q., Wang, J., Zhao, R.: Strong Authentication Scheme for Telecare Medicine Information Systems. Journal of
Medical Systems 36, 2609-2619 (2012)
315. Pu, Q.: An improved two-factor authentication protocol. In: 2010 International Conference on MultiMedia and
Information Technology, MMIT 2010, pp. 223-226. (2010)
316. Qian, H., Surapaneni, C.S., Dispensa, S., Medhi, D.: Service management architecture and system capacity design for
phonefactorTM-A two-factor authentication service. In: 2009 IFIP/IEEE International Symposium on Integrated
Network Management, IM 2009, pp. 73-80. (2009)
317. Qian, H., Surapaneni, C.S., Ray, M., Dispensa, S., Medhi, D.: DReaM-Cache: Distributed real-time transaction
memory cache to support two-factor authentication services and its reliability. In: Proceedings of the 2010 IEEE/IFIP
Network Operations and Management Symposium, NOMS 2010, pp. 333-340. (2010)
318. Qu, J., Tan, X.L.: Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem.
Journal of Electrical and Computer Engineering 2014, (2014)
319. Ramasamy, R., Muniyandi, A.P.: An Efficient Password Authentication Scheme for Smart Card. IJ Network Security
14, 180-186 (2012)
320. Rao, T.V.N., Vedavathi, K.: Authentication using mobile phone as a security token. IJCSET 1, 569-574 (2011)
321. Ren, X., Wu, X.-W., Tang, K.: TSPass: A Dynamic User Authentication Scheme Based On Time and Space. IJCSNS
12, 45 (2012)
322. Resende, A.C.D., Mochetti, K., Aranha, D.F.: PUF-based mutual multifactor entity and transaction authentication for
secure banking. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), vol. 9542, pp. 77-96 (2016)
323. Rhee, H.S., Kwon, J.O., Lee, D.H.: A remote user authentication scheme without using smart cards. Computer
Standards & Interfaces 31, 6-13 (2009)
324. Sabzevar, A.P., Stavrou, A.: Universal multi-factor authentication using graphical passwords. In: SITIS 2008 -
Proceedings of the 4th International Conference on Signal Image Technology and Internet Based Systems, pp. 625-
632. (2008)
325. Sarier, N.D.: A survey of distributed biometric authentication systems. In: Lecture Notes in Informatics (LNI),
Proceedings - Series of the Gesellschaft fur Informatik (GI), pp. 129-140. (2009)
326. Sarier, N.D.: Improving the accuracy and storage cost in biometric remote authentication schemes. Journal of
Network and Computer Applications 33, 268-274 (2010)
327. Sarika, T., Nawaz, S.S.: Multi-factor user authentication in wireless sensor networks. Int J Comput Sci Telecommun
2, 59-63 (2011)
328. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Secure and Light Weight Authentication Service in Hadoop
using One Time Pad. Procedia Computer Science 50, 81-86 (2015)
329. Saxena, A.: Dynamic authentication: Need than a choice. In: 3rd IEEE/Create-Net International Conference on
Communication System Software and Middleware, COMSWARE, pp. 214-218. (2007)
330. Selcuk Uluagac, A., Liu, W., Beyah, R.: A multi-factor re-authentication framework with user privacy. In: 2014
IEEE Conference on Communications and Network Security, CNS 2014, pp. 504-505. (2014)
331. Sery, P.: Tighter SSH security with two-factor authentication. Linux J. 2006, 3 (2006)
332. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: Security enhancement for the timestamp-based password authentication
scheme using smart cards. Computers & Security 22, 591-595 (2003)
333. Shiuh-Jeng, W., Jin-Fu, C.: Smart card based secure password authentication scheme. Computers & Security 15,
231-237 (1996)
334. Shunmuganathan, S., Saravanan, R.D., Palanichamy, Y.: Secure and efficient smart-card-based remote user
authentication scheme for multiserver environment. Canadian Journal of Electrical and Computer Engineering 38,
20-30 (2015)
335. Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Cryptanalysis and improvement of ‘a secure
authentication scheme for telecare medical information system’ with nonce verification. Peer-to-Peer Networking
and Applications (2015)
336. Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Smart environment as a service: Three factor cloud based
user authentication for telecare medical information system. Journal of Medical Systems 38, (2014)
337. Singh, A., Rishi, R.: An improved two-factor authenticated key exchange protocol in public wireless LANs. In:
International Conference on Advanced Computing and Communication Technologies, ACCT, pp. 226-230. (2013)
338. Singh, V., Dahiya, P., Singh, S.: Smart card based password authentication and user anonymity scheme using ECC
and steganography. In: Proceedings of the 2014 International Conference on Advances in Computing,
Communications and Informatics, ICACCI 2014, pp. 1614-1621. (2014)
339. Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32, 321-
325 (2010)
340. Sood, S.K., Sarje, A.K., Singh, K.: A secure dynamic identity based authentication protocol for multi-server
architecture. Journal of Network and Computer Applications 34, 609-618 (2011)
341. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Liao et al.'s authentication scheme using smart cards. In:
Advance Computing Conference (IACC), 2010 IEEE 2nd International, pp. 240-245. IEEE, (2010)
342. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.'s authentication scheme using smart cards. In:
Proceedings of the third annual ACM Bangalore conference, pp. 15. ACM, (2010)
343. Sood, S.K.: An improved and secure smart card based dynamic identity authentication protocol. International Journal
of Network Security 14, 39-46 (2012)
344. Stockdale, J., Vakaloudis, A., Escaño, J.M., Liang, J., Cahill, B.: A fuzzy system for three-factor, non-textual
authentication. Studies in Computational Intelligence, vol. 591, pp. 125-137 (2015)
345. Suh, J.: Veri-Pen: A Pen-based Identification Through Natural Biometrics Extraction. Proceedings of the 2016 CHI
Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA
(2016)
346. Sukarno, P., Bhattacharjee, N.: Authentication Architecture Based on Crypto-biometric Systems. In: Proceedings of
the 2008 International Conference on Security and Management, SAM 2008, pp. 638-644. (2008)
347. Sun, D.-Z., Huai, J.-P., Sun, J.-Z., Li, J.-X., Zhang, J.-W., Feng, Z.-Y.: Improvements of Juang's password-
authenticated key agreement scheme using smart cards. IEEE Transactions on industrial electronics 56, 2284-2291
(2009)
348. Sun, D.Z., Li, J.X., Feng, Z.Y., Cao, Z.F., Xu, G.Q.: ON the security and improvement of a two-factor user
authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing 17, 895-905 (2013)
349. Sun, H.-M., Chen, Y.-H., Lin, Y.-H.: oPass: A user authentication protocol resistant to password stealing and
password reuse attacks. IEEE transactions on information forensics and security 7, 651-663 (2012)
350. Sun, J., Zhang, R., Zhang, J., Zhang, Y.: TouchIn: Sightless two-factor authentication on multi-touch mobile devices.
In: 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 436-444. (2014)
351. Svogor, I., Kisasondi, T.: Two factor authentication using EEG augmented passwords. In: Proceedings of the
International Conference on Information Technology Interfaces, ITI, pp. 373-378. (2012)
352. Tan, Z.: A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.
Journal of Medical Systems 38, (2014)
353. Tan, Z.: An authentication and key agreement scheme with key confirmation and privacy-preservation for multi-
server environments. Journal of Computers 6, 2295-2301 (2011)
354. Tan, Z.: An efficient biometrics-based authentication scheme for telecare medicine information systems. network 2,
200-204 (2013)
355. Tan, Z.: Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks. Advances in
Information Sciences and Service Sciences 3, 117-126 (2011)
356. Tang, H.B., Liu, X.S., Li, Y.: Cryptanalysis of a biometric-based remote user authentication scheme. In: International
Conference on Information Science and Control Engineering 2012 (ICISCE 2012), IET, pp. 1-5. (2012)
357. Tang, H.B., Zhu, Z.J., Gao, Z.W., Li, Y.: A secure biometric-based authentication scheme using smart card. In:
International Conference on Cyberspace Technology (CCT 2013), pp. 39-43. (2013)
358. Tian, X., Zhu, R.W., Wong, D.S.: Improved Efficient Remote User Authentication Schemes. IJ Network Security 4,
149-154 (2007)
359. Ting, S.L., Tsang, A.H.C.: A two-factor authentication system using Radio Frequency Identification and
watermarking technology. Computers in Industry 64, 268-279 (2013)
360. Tiwari, A., Sanyal, S., Abraham, A., Knapskog, S.J., Sanyal, S.: A multi-factor security protocol for wireless
payment-secure web authentication using mobile devices. arXiv preprint arXiv:1111.3010 (2011)
361. Tritilanunt, S., Thanyamanorot, N., Ritdecha, N.: A secure authentication protocol using HOTP on USB storage
devices. In: International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), 2014,
pp. 1908-1912. (2014)
362. Tsague, H.D., Nelwamondo, F., Msimang, N.: An advanced mutual-authentication algorithm using 3DES for smart
card systems. In: Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International
Conference on Social Computing and Its Applications, CGC/SCA 2012, pp. 660-666. (2012)
363. Tsaur, W.-J., Li, J.-H., Lee, W.-B.: An efficient and secure multi-server authentication scheme with key agreement.
Journal of Systems and Software 85, 876-882 (2012)
364. Tsaur, W.-J., Wu, C.-C., Lee, W.-B.: A smart card-based remote scheme for password authentication in multi-server
Internet services. Computer Standards & Interfaces 27, 39-51 (2004)
365. Turkanovic, M., Holbl, M.: An improved dynamic password-based user authentication scheme for hierarchical
wireless sensor networks. Elektronika ir Elektrotechnika 19, 109-116 (2013)
366. Ullah, S., Xuefeng Dr, Z., Feng Dr, Z.: TCLOUD: A Multi - factor access control framework for cloud computing.
International Journal of Security and its Applications 7, 15-26 (2013)
367. Urien, P.: Introducing TLS-PSK authentication for EMV devices. In: Collaborative Technologies and Systems
(CTS), 2010 International Symposium on, pp. 371-377. (2010)
368. Uymatiao, M.L.T., Yu, W.E.S.: Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme
using TLS seed exchange and encrypted offline keystore. In: ICIST 2014 - Proceedings of 2014 4th IEEE
International Conference on Information Science and Technology, pp. 225-229. (2014)
369. Vaidya, B., Makrakis, D., Mouftah, H.: Two‐factor mutual authentication with key agreement in wireless sensor
networks. Security and Communication Networks (2012)
370. Vaidya, B., Makrakis, D., Mouftah, H.: Two-factor mutual authentication with key agreement in wireless sensor
networks. Security and Communication Networks 9, 171-183 (2016)
371. Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two-factor user authentication in wireless sensor networks. In:
2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications,
WiMob'2010, pp. 600-606. (2010)
372. Vaka, V., Lindskog, D., Zavarsky, P.: Enhancing of biometric authentication with pass strings and cryptographic
checksums. In: 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 170-170. (2016)
373. Virgile, K., Yu, H.: Securing cloud emails using two factor authentication based on password/apps in cloud
computing. International Journal of Security and its Applications 9, 121-130 (2015)
374. Wang, B., Wang, Y., Zhang, H.: A new secure password authentication scheme using smart cards. Wuhan University
Journal of Natural Sciences 13, 739-743 (2008)
375. Wang, D., Ma, C.-g., Wang, P., Chen, Z.: Robust smart card based password authentication scheme against smart
card security breach. (2012)
376. Wang, D., Ma, C.-g.: Cryptanalysis and security enhancement of a remote user authentication scheme using smart
cards. The Journal of China Universities of Posts and Telecommunications 19, 104-114 (2012)
377. Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: Efficient and provably secure two-factor
authentication scheme with user anonymity. Information Sciences 321, 162-178 (2015)
378. Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile
networks. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 3136-3141. (2014)
379. Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: A two-factor lightweight privacy-preserving authentication
scheme for VANET. IEEE Transactions on Vehicular Technology 65, 896-911 (2016)
380. Wang, F., Zhang, Y., Xu, Y., Wu, L., Diao, B.: A DoS-resilient enhanced two-factor user authentication scheme in
wireless sensor networks. In: International Conference on Computing, Networking and Communications (ICNC),
2014, pp. 1096-1102. IEEE, (2014)
381. Wang, N.-W., Chao, H.-C., Chen, I.-Y., Huang, Y.-M.: A novel user’s authentication scheme for pervasive on-line
media services. Telecommunication Systems 44, 181-190 (2010)
382. Wang, R.C., Juang, W.S., Lei, C.L.: A robust authentication scheme with user anonymity for wireless environments.
International Journal of Innovative Computing, Information and Control 5, 1069-1080 (2009)
383. Wang, R.-C., Juang, W.-S., Lei, C.-L.: Robust authentication and key agreement scheme preserving the privacy of
secret key. Computer Communications 34, 274-280 (2011)
384. Wang, Y.-y., Liu, J.-y., Xiao, F.-x., Dan, J.: A more efficient and secure dynamic ID-based remote user
authentication scheme. Computer communications 32, 583-585 (2009)
385. Wangsuk, K., Anusas-amornkul, T.: Trajectory Mining for Keystroke Dynamics Authentication. Procedia Computer
Science 24, 175-183 (2013)
386. Wazid, M., Das, A.K., Kumari, S., Li, X., Wu, F.: Design of an efficient and provably secure anonymity preserving
three-factor user authentication and key agreement scheme for TMIS. Security and Communication Networks (2016)
387. Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. Journal of
Medical Systems 36, 3597-3604 (2012)
388. Wei, J., Liu, W., Hu, X.: Cryptanalysis and improvement of a robust smart card authentication scheme for multi-
server architecture. Wireless Personal Communications 77, 2255-2269 (2014)
389. Wen, F., Guo, D.: An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems.
Journal of Medical Systems 38, 1-11 (2014)
390. Wen, F., Li, X., Cui, S.: An improved dos-resistant id-based password authentication scheme without using smart
card. Journal of Electronics (China) 28, 580-586 (2011)
391. Wen, F., Susilo, W., Yang, G.: Analysis and Improvement on a Biometric-Based Remote User Authentication
Scheme Using Smart Cards. Wireless Personal Communications 80, 1747-1760 (2015)
392. Wen, F.: A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System.
Journal of Medical Systems 38, 1-7 (2014)
393. Wen, F.: A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected
Health Care. Journal of Medical Systems 37, 1-9 (2013)
394. Wong, F.W.M.H., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing
biometrics with artificial neural networks and k-nearest neighbor algorithm. In: Signals, Systems and Computers,
2001. Conference Record of the Thirty-Fifth Asilomar Conference on, pp. 911-915. IEEE, (2001)
395. Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: A secure authentication scheme with anonymity for wireless communications.
IEEE Communications Letters 12, 722-723 (2008)
396. Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal
proof. Peer-to-Peer Networking and Applications 1-15 (2015)
397. Wu, F., Xu, L., Kumari, S., Li, X.: A novel and provably secure biometrics-based three-factor remote authentication
scheme for mobile client-server networks. Computers and Electrical Engineering 45, 274-285 (2015)
398. Wu, F., Xu, L., Kumari, S., Li, X.: An improved and anonymous two-factor authentication protocol for health-care
applications with wireless medical sensor networks. Multimedia Systems (2015)
399. Wu, S., Kang, F., Pu, Q.: Practical remote mutual authentication with key agreement scheme for mobile devices on
elliptic curve cryptosystem. Journal of Internet Technology 13, 411-418 (2012)
400. Wu, S., Zhu, Y.: Improved two-factor authenticated key exchange protocol. Int. Arab J. Inf. Technol. 8, 430-439
(2011)
401. Wu, T.-C.: Remote login authentication scheme based on a geometric approach. Computer Communications 18, 959-
963 (1995)
402. Xie, M., Li, Y., Yoshigoe, K., Seker, R., Bian, J.: CamAuth: Securing Web Authentication with Camera. In: 2015
IEEE 16th International Symposium on High Assurance Systems Engineering, pp. 232-239. (2015)
403. Xie, Q., Dong, N., Wong, D.S., Hu, B.: Cryptanalysis and security enhancement of a robust two‐factor authentication
and key agreement protocol. International Journal of Communication Systems (2014)
404. Xie, Q., Dong, N., Wong, D.S., Hu, B.: Cryptanalysis and security enhancement of a robust two-factor authentication
and key agreement protocol. International Journal of Communication Systems 29, 478-487 (2016)
405. Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service
in global mobility network. Wireless Personal Communications 74, 601-614 (2014)
406. Xie, Q., Liu, W.-h., Wang, S.-b., Hu, B., Dong, N., Yu, X.-y.: Robust password and smart card based authentication
scheme with smart card revocation. Journal of Shanghai Jiaotong University (Science) 19, 418-424 (2014)
407. Xie, Q., Zhang, J., Dong, N.: Robust Anonymous Authentication Scheme for Telecare Medical Information Systems.
Journal of Medical Systems 37, 1-8 (2013)
408. Xie, Q.: Improvement of a security enhanced one-time two-factor authentication and key agreement scheme. Scientia
Iranica 19, 1856-1860 (2012)
409. Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable
security. Computer Standards & Interfaces 31, 723-728 (2009)
410. Xu, L., Wu, F.: An improved and provable remote user authentication scheme based on elliptic curve cryptosystem
with user anonymity. Security and Communication Networks 8, 245-260 (2015)
411. Xu, L., Wu, F.: Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and
Anonymity for Connected Health Care. Journal of Medical Systems 39, 1-9 (2015)
412. Xu, Q., Huang, P., Yang, T.: An enhanced biometrics-key-based remote user authentication scheme with smart card.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 52, 2645-2655 (2015)
413. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L.: A secure and efficient authentication and key agreement scheme
based on ECC for telecare medicine information systems. Journal of Medical Systems 38, (2014)
414. yang, C.-C., Wang, R.-C.: An improvement of security enhancement for the timestamp-based password
authentication scheme using smart cards. SIGOPS Oper. Syst. Rev. 38, 91-96 (2004)
415. Yang, D., Yang, B.: A biometric password-based multi-server authentication scheme with smart card. In:
International Conference on Computer Design and Applications (ICCDA), 2010, pp. V5-554-V555-559. IEEE,
(2010)
416. Yang, D., Yang, B.: A new password authentication scheme using fuzzy extractor with smart card. In: International
Conference on Computational Intelligence and Security, 2009. CIS'09., pp. 278-282. IEEE, (2009)
417. Yang, D.Y.B., Yang, B.: A novel multi-factor authenticated key exchange scheme with privacy preserving. Journal
of Internet Services and Information Security 1, 44-56 (2011)
418. Yang, G., Wong, D.S., Wang, H., Deng, X.: Formal analysis and systematic construction of two-factor authentication
scheme (short paper). In: International Conference on Information and Communications Security, pp. 82-91.
Springer, (2006)
419. Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords.
Journal of Computer and System Sciences 74, 1160-1172 (2008)
420. Yang, L., Ma, J.-F., Jiang, Q.: Mutual Authentication Scheme with Smart Cards and Password under Trusted
Computing. IJ Network Security 14, 156-163 (2012)
421. Yang, W.-H., Shieh, S.-P.: Password authentication schemes with smart cards. Computers & Security 18, 727-733
(1999)
422. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W., Zou, D.: Efficient password-based two factors authentication in cloud
computing. International Journal of Security and its Applications 6, 143-148 (2012)
423. Yassin, A.A., Jin, H., Ibrahim, A., Zou, D.: Anonymous password authentication scheme by using digital signature
and fingerprint in cloud computing. In: Proceedings - 2nd International Conference on Cloud and Green Computing
and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012, pp. 282-289. (2012)
424. Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust elliptic curve cryptography-based three factor user
authentication providing privacy of biometric data. IET Information Security 7, 247-252 (2013)
425. Yeole, A.S.: Proposal for novel 3D password for providing authentication in critical web applications. In:
International Conference and Workshop on Emerging Trends in Technology 2011, ICWET 2011 - Conference
Proceedings, pp. 663-666. (2011)
426. Yildiz, M., M, G., x0F, kt, x0Fc, rk: Combining Biometric ID Cards and Online Credit Card Transactions. In: Fourth
International Conference on Digital Society, 2010. ICDS '10., pp. 20-24. (2010)
427. Yin, D.B.M., Kamal, M.I., Azmanuddin, N.S., Ali, S.H.S., Othman, A.T., Chik, R.Z.W.: Electronic Door Access
Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-
based Face Recognition using Principal Component Analysis. Proceedings of the 10th International Conference on
Ubiquitous Information Management and Communication. ACM, Danang, Viet Nam (2016)
428. Yoo, S., Shin, S.J., Ryu, D.H.: An innovative two factor authentication method: The QRLogin system. International
Journal of Security and its Applications 7, 293-302 (2013)
429. Yoo, S.G., Lee, H., Kim, J.: A performance and usability aware secure two-factor user authentication scheme for
wireless sensor networks. International Journal of Distributed Sensor Networks 2013, (2013)
430. Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: An improvement of Hwang–Lee–Tang's simple remote user authentication
scheme. Computers & Security 24, 50-56 (2005)
431. Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: Further improvement of an efficient password based remote user authentication
scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 612-614 (2004)
432. Yoon, E.J., Yoo, K.Y.: A three-factor authenticated key agreement scheme for SIP on elliptic curves. In: Proceedings
- 2010 4th International Conference on Network and System Security, NSS 2010, pp. 334-339. (2010)
433. Yoon, E.-J., Yoo, K.-Y.: Robust biometrics-based multi-server authentication with key agreement scheme for smart
cards on elliptic curve cryptosystem. The Journal of Supercomputing 63, 235-255 (2013)
434. Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient generic framework for three-factor authentication with provably
secure instantiation. IEEE Transactions on Information Forensics and Security 9, 2302-2313 (2014)
435. Yu, Z., Jingchun, X., Dake, H.: Trusted user authentication scheme combining password with fingerprint for mobile
devices. In: Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on, pp. 1-8.
(2008)
436. Yuan, J.-J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems
55, 105-113 (2014)
437. Zhang, L., Tang, S., Chen, J., Zhu, S.: Two-Factor Remote Authentication Protocol with User Anonymity Based on
Elliptic Curve Cryptography. Wireless Personal Communications 81, 53-75 (2015)
438. Zhang, M., Zhang, J., Zhang, Y.: Remote three-factor authentication scheme based on Fuzzy extractors. Security and
Communication Networks 8, 682-693 (2015)
439. Zhou, W., Yue, Y., Yu, B.: Research of multi-factor identity authentication scheme for ZigBee network nodes.
Xitong Fangzhen Xuebao / Journal of System Simulation 27, 762-769 (2015)
440. Zhu, H., Lin, X., Zhang, Y., Lu, R.: Duth: A user-friendly dual-factor authentication for Android smartphone
devices. Security and Communication Networks 8, 1213-1222 (2015)
441. Zhu, Z.: An Efficient Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical
Systems 36, 3833-3838 (2012)
442. Ziauddin, S.: A two-factor mutual authentication scheme using biometrics and smart card. Communications in
Computer and Information Science, vol. 58, pp. 209-216 (2009)
Acceptance Topic 3 (AT3): Comparison and Selection Criteria
1. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., Sakurai, K.: Authentication in mobile cloud computing: A
survey. Journal of Network and Computer Applications 61, 59-80 (2016)
2. Anwar, M., Imran, A.: A comparative study of graphical and alphanumeric passwords for mobile device
authentication. In: CEUR Workshop Proceedings, pp. 13-18. (2015)
3. Borde, D.d.: Selecting a two-factor authentication system. Network Security 2007, 17-20 (2007)
4. Bruun, A., Jensen, K., Kristensen, D.: Usability of single-and multi-factor authentication methods on tabletops: A
comparative study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence
and Lecture Notes in Bioinformatics), vol. 8742, pp. 299-306 (2014)
5. Choksi, S.: Comparative Study on Authentication Schemes for Cloud Computing. In: International Journal of
Engineering Development and Research. IJEDR, (2014)
6. Gunson, N., Marshall, D., Morton, H., Jack, M.: User perceptions of security and usability of single-factor and two-
factor authentication in automated telephone banking. Computers and Security 30, 208-220 (2011)
7. Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: Proceedings of the 2nd International
Symposium on Human Aspects of Information Security and Assurance, HAISA 2008, pp. 80-93. (2008)
8. Hua, R., Zhang, R., Li, D.: Security analysis of authentication schemes in M-commerce based on fuzzy
comprehensive evaluation. In: ICISO 2010 - Proceedings of the 12th International Conference on Informatics and
Semiotics in Organisations, IFIP WG8.1 Working Conference, pp. 245-251. (2010)
9. Jansen, W.: Authenticating users on handheld devices. In: Proceedings of the Canadian Information Technology
Security Symposium, pp. 1-12. (2003)
10. Kiljan, S., Vranken, H., van Eekelen, M.: Evaluation of transaction authentication methods for online banking.
Future Generation Computer Systems (2016)
11. Kumari, S., Khan, M.K., Atiquzzaman, M.: User authentication schemes for wireless sensor networks: A review. Ad
Hoc Networks 27, 159-194 (2015)
12. Madhusudhan, R., Mittal, R.C.: Dynamic ID-based remote user password authentication schemes using smart cards:
A review. Journal of Network and Computer Applications 35, 1235-1248 (2012)
13. O'Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91,
2021-2040 (2003)
14. Park, K.C., Shin, J.W., Lee, B.G.: Analysis of Authentication Methods for Smartphone Banking Service using ANP.
TIIS 8, 2087-2103 (2014)
15. Ruoti, S., Roberts, B., Seamons, K.: Authentication Melee: A Usability Analysis of Seven Web Authentication
Systems. Proceedings of the 24th International Conference on World Wide Web. ACM, Florence, Italy (2015)
16. Skracic, K., Pale, P., Jeren, B.: Knowledge based authentication requirements. In: 2013 36th International
Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2013 -
Proceedings, pp. 1116-1120. (2013)
17. Zviran, M., Erlich, Z.: Identification and authentication: technology and implementation issues. Communications of
the Association for Information Systems 17, 4 (2006)
Acceptance Topic 4 (AT4): Decision Frameworks
1. Altinkemer, K., Wang, T.: Cost and benefit analysis of authentication systems. Decision Support Systems 51, 394-
404 (2011)
2. Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: A framework for
comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553-
567. IEEE, (2012)
3. Eliasson, C., Fiedler, M., Jørstad, I.: A criteria-based evaluation framework for authentication schemes in IMS. In:
Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 865-869. (2009)
4. Forget, A., Chiasson, S., Biddle, R.: User-centred authentication feature framework. Information and Computer
Security 23, 497-515 (2015)
5. Guel, M.D.: A Framework for Choosing Your Next Generation Authentication/Authorization System. Information
Security Technical Report 7, 63-78 (2002)
6. Kim, J.Y.: Efficiency of Paid Authentication Methods for Mobile Devices. Wireless Personal Communications 1-9
(2016)
7. Palmer, A.J.: Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA).
Computers and Security 29, 785-806 (2010)
8. Wang, D., Gu, Q., Cheng, H., Wang, P.: The Request for Better Measurement: A Comparative Evaluation of Two-
Factor Authentication Schemes. Proceedings of the 11th ACM on Asia Conference on Computer and
Communications Security. ACM, Xi'an, China (2016)