Accepted Articles for Authentication Schemes and …colvin.chillan.ubiobio.cl/mcaro/Accepted...

42
Accepted Articles for Authentication Schemes and Methods: a Systematic Literature Review Acceptance Topic 1 (AT1): Authentication Schemes 1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment. International Journal of Security and Its Applications (IJSIA) 9, 35-46 (2015) 2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognition Letters (2015) 3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A comparative approach between cepstral features for human authentication using heart sounds. Signal, Image and Video Processing 10, 843-851 (2016) 4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: User authentication through biometric sensors and decision fusion. In: 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. (2013) 5. Adida, B.: EmID: Web authentication by email address. In: Proceedings of Web. (2008) 6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools and Applications 1-19 (2016) 7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical passwords for augmenting, not replacing, text passwords. Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New Orleans, Louisiana, USA (2013) 8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In: 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 369-374. (2013) 10. Ali, A.M.: Zero footprint secure internet authentication using network smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3928 LNCS, pp. 91-104 (2006) 11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke Biometric Systems for User Authentication. Journal of Signal Processing Systems 1-16 (2016) 12. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58, 108-116 (2013) 13. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: IPAS: Implicit password authentication system. In: IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pp. 430-435. IEEE, (2011) 14. Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security (WorldCIS), pp. 223-225. (2011) 15. Alrawais, A., Alhothaily, A., Cheng, X.: Secure authentication scheme using dual channels in rogue access point environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8491, pp. 554-563 (2014) 16. Alzomai, M., Alfayyadh, B., Jøsang, A.: Display security for online transactions: SMS-based authentication scheme. In: 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. (2010) 17. Alzomai, M., Jøsang, A., McCullagh, A., Foo, E.: Strengthening SMS-based authentication through usability. In: Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, pp. 683-688. (2008) 18. Amin, R., Biswas, G.P.: A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. Journal of Medical Systems 39, 1-17 (2015)

Transcript of Accepted Articles for Authentication Schemes and …colvin.chillan.ubiobio.cl/mcaro/Accepted...

Accepted Articles for Authentication Schemes and

Methods: a Systematic Literature Review

Acceptance Topic 1 (AT1): Authentication Schemes

1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band Authentication Using Image-Based One Time Password in

the Cloud Environment. International Journal of Security and Its Applications (IJSIA) 9, 35-46 (2015)

2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level approach to EEG based human authentication using

eye blinking. Pattern Recognition Letters (2015)

3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A comparative approach between cepstral features for

human authentication using heart sounds. Signal, Image and Video Processing 10, 843-851 (2016)

4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: User authentication through biometric

sensors and decision fusion. In: 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013.

(2013)

5. Adida, B.: EmID: Web authentication by email address. In: Proceedings of Web. (2008)

6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active

authentication on smart devices. Multimedia Tools and Applications 1-19 (2016)

7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical passwords for augmenting, not replacing, text passwords.

Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New Orleans, Louisiana, USA

(2013)

8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making Random Passwords Memorable: Leveraging Users'

Cognitive Ability Through Multiple Cues. Proceedings of the 33rd Annual ACM Conference on Human Factors in

Computing Systems. ACM, Seoul, Republic of Korea (2015)

9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual

authentication and key exchange. In: 2013 8th International Conference for Internet Technology and Secured

Transactions, ICITST 2013, pp. 369-374. (2013)

10. Ali, A.M.: Zero footprint secure internet authentication using network smart card. Lecture Notes in Computer

Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3928

LNCS, pp. 91-104 (2006)

11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke Biometric Systems for User Authentication. Journal of

Signal Processing Systems 1-16 (2016)

12. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system

(IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58, 108-116 (2013)

13. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: IPAS: Implicit password authentication system. In: IEEE

Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pp.

430-435. IEEE, (2011)

14. Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security

(WorldCIS), pp. 223-225. (2011)

15. Alrawais, A., Alhothaily, A., Cheng, X.: Secure authentication scheme using dual channels in rogue access point

environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and

Lecture Notes in Bioinformatics), vol. 8491, pp. 554-563 (2014)

16. Alzomai, M., Alfayyadh, B., Jøsang, A.: Display security for online transactions: SMS-based authentication scheme.

In: 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. (2010)

17. Alzomai, M., Jøsang, A., McCullagh, A., Foo, E.: Strengthening SMS-based authentication through usability. In:

Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA

2008, pp. 683-688. (2008)

18. Amin, R., Biswas, G.P.: A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical

Server Usable in TMIS. Journal of Medical Systems 39, 1-17 (2015)

19. Amin, R., Biswas, G.P.: Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using

Smart Card. Arabian Journal for Science and Engineering 40, 3135-3149 (2015)

20. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: An Efficient and Practical Smart Card Based

Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical

Systems 39, 1-18 (2015)

21. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I., Cameron, D., Fischer, M.H.: VIP: a visual approach to user

authentication. Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, Trento, Italy (2002)

22. Annapurani, K., Sadiq, M.A.K., Malathy, C.: Fusion of shape of the ear and tragus – A unique feature extraction

method for ear authentication system. Expert Systems with Applications 42, 649-656 (2015)

23. Antal, M., Szabó, L.Z.: Biometric Authentication Based on Touchscreen Swipe Patterns. Procedia Technology 22,

862-869 (2016)

24. Arif, A., Pahud, M., Hinckley, K., Buxton, W.: A tap and gesture hybrid method for authenticating smartphone users.

Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services.

ACM, Munich, Germany (2013)

25. Arthur Evans, Jr., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring secrecy in the computer.

Commun. ACM 17, 437-442 (1974)

26. Assaad, F.S., Serpen, G.: Transformation based Score Fusion Algorithm for Multi-modal Biometric User

Authentication through Ensemble Classification. Procedia Computer Science 61, 410-415 (2015)

27. Atallah, M.J., Frikken, K.B., Goodrich, M.T., Tamassia, R.: Secure biometric authentication for weak computational

devices. In: Lecture Notes in Computer Science, pp. 357-371. (2005)

28. Awasthi, A.K., Lal, S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE

Transactions on Consumer Electronics 49, 1246-1248 (2003)

29. Awasthi, A.K., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Transactions on

Consumer Electronics 50, 583-586 (2004)

30. Awasthi, A.K., Srivastava, K.: A Biometric Authentication Scheme for Telecare Medicine Information Systems with

Nonce. Journal of Medical Systems 37, 1-4 (2013)

31. Aykut, M., Ekinci, M.: Developing a contactless palmprint authentication system by introducing a novel ROI

extraction method. Image and Vision Computing 40, 65-74 (2015)

32. Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication.

Fuzzy Optimization and Decision Making 7, 243-256 (2008)

33. Babu, B.S., Venkataram, P.: An authentication scheme for personalized mobile multimedia services: A cognitive

agents based approach. In: Proceedings of Future Generation Communication and Networking, FGCN 2007, pp. 167-

172. (2007)

34. Babu, B.S., Venkataram, P.: Cognitive agents based authentication & privacy scheme for mobile transactions

(CABAPS). Computer Communications 31, 4060-4071 (2008)

35. Bai, Z., Hatzinakos, D.: LBP-based biometric hashing scheme for human authentication. In: 11th International

Conference on Control, Automation, Robotics and Vision, ICARCV 2010, pp. 1842-1847. (2010)

36. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral

biometrics. Computers & Security 43, 77-89 (2014)

37. Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information

Conference (SAI), 2014, pp. 601-606. (2014)

38. Bandyopadhyay, S.K., Bhattacharyya, D., Das, P.: User authentication by Secured Graphical Password

Implementation. In: Information and Telecommunication Technologies, 2008. APSITT. 7th Asia-Pacific Symposium

on, pp. 7-12. (2008)

39. Banerjee, P.K., Chandra, J.K., Datta, A.K.: Feature based optimal trade-off parameter selection of frequency domain

correlation filter for real time face authentication. Proceedings of the 2011 International Conference on

Communication, Computing & Security. ACM, Rourkela, Odisha, India (2011)

40. Bansal, M., Hanmandlu, M., Kumar, P.: IRIS based authentication using local principal independent components.

Optik - International Journal for Light and Electron Optics 127, 4808-4814 (2016)

41. Bashir, M., Scharfenberg, G., Kempf, J.: Person Authentication by Handwriting in air using a Biometric Smart Pen

Device. BIOSIG 191, 219-226 (2011)

42. Bennet, D., Arumugaperumal, S.: Fingerprint based multi-server authentication system. In: International Conference

on Electronics Computer Technology (ICECT), 2011 3rd, pp. 115-119. (2011)

43. Best, D.S., Duchowski, A.T.: A rotary dial for gaze-based PIN entry. Proceedings of the Ninth Biennial ACM

Symposium on Eye Tracking Research & Applications. ACM, Charleston, South Carolina (2016)

44. Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework.

Journal of Medical Informatics & Technologies 23, (2014)

45. Bianchi, A., Oakley, I., Kwon, D.S.: The secure haptic keypad: a tactile password system. Proceedings of the

SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta, Georgia, USA (2010)

46. Bianchi, A., Oakley, I., Kwon, D.S.: Using mobile device screens for authentication. Proceedings of the 23rd

Australian Computer-Human Interaction Conference. ACM, Canberra, Australia (2011)

47. Bicakci, K., Oorschot, P.C.v.: A multi-word password proposal (gridWord) and exploring questions about science in

security research and usable security evaluation. Proceedings of the 2011 workshop on New security paradigms

workshop. ACM, Marin County, California, USA (2011)

48. Binu, S., Misbahuddin, M., Raj, P.: A Single Sign on based secure remote user authentication scheme for Multi-

Server Environments. In: International Conference on Computer and Communications Technologies (ICCCT), 2014,

pp. 1-6. (2014)

49. Borisov, A.: A Novel Approach for User Authentication to Industrial Components Using QR Codes. In: Computer

Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, pp. 61-66. IEEE, (2015)

50. Boudguiga, A., Laurent, M.: An ID-based authentication scheme for the IEEE 802.11s mesh network. In: 2010 IEEE

6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010,

pp. 256-263. (2010)

51. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know.

Proceedings of the 13th ACM conference on Computer and communications security. ACM, Alexandria, Virginia,

USA (2006)

52. Brown, M., Doswell, F.R.: Using passtones instead of passwords. Proceedings of the 48th Annual Southeast

Regional Conference. ACM, Oxford, Mississippi (2010)

53. Bulling, A., Alt, F., Schmidt, A.: Increasing the security of gaze-based cued-recall graphical passwords using

saliency masks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin,

Texas, USA (2012)

54. Cagalj, M., Perkovic, T., Bugaric, M.: Timing attacks on cognitive authentication schemes. IEEE Transactions on

Information Forensics and Security 10, 584-596 (2015)

55. Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and improvements to an RIFD mutual authentication protocol and its

extensions. Proceedings of the second ACM conference on Wireless network security. ACM, Zurich, Switzerland

(2009)

56. Carter, N.J.: Graphical Passwords for Older Computer Users. Adjunct Proceedings of the 28th Annual ACM

Symposium on User Interface Software & Technology. ACM, Daegu, Kyungpook, Republic of Korea (2015)

57. Catuogno, L., Galdi, C.: On user authentication by means of video events recognition. Journal of Ambient

Intelligence and Humanized Computing 5, 909-918 (2014)

58. Chang, C.-C., Hsueh, W.-Y., Cheng, T.-F.: A Dynamic User Authentication and Key Agreement Scheme for

Heterogeneous Wireless Sensor Networks. Wireless Personal Communications 89, 447-465 (2016)

59. Chang, Y.-F., Chang, C.-C., Kuo, J.-Y.: A secure one-time password authentication scheme using smart cards

without limiting login times. SIGOPS Oper. Syst. Rev. 38, 80-90 (2004)

60. Chatzis, V., Bors, A.G., Pitas, I.: Multimodal decision-level fusion for person authentication. IEEE transactions on

systems, man, and cybernetics-part a: systems and humans 29, 674-680 (1999)

61. Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K.: An Improved and Secure Biometric Authentication Scheme

for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. Journal of Medical Systems 39,

1-12 (2015)

62. Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks.

Multimedia Tools and Applications 1-21 (2016)

63. Chelliah, B., Geetha, S.: Enhancing E-Payment Security through Biometric Based Personal Authentication Using

Steganography Scheme - B-PASS. Communications in Computer and Information Science, vol. 420 CCIS, pp. 461-

472 (2014)

64. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme.

International Journal of Communication Systems 27, 377-389 (2014)

65. Chen, C.-L., Deng, Y.-Y.: Conformation of EPC Class 1 Generation 2 standards RFID system with mutual

authentication and privacy protection. Engineering Applications of Artificial Intelligence 22, 1284-1291 (2009)

66. Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system

for smartphones. Proceedings of the 12th annual international conference on Mobile systems, applications, and

services. ACM, Bretton Woods, New Hampshire, USA (2014)

67. Chen, T., Huang, S.H.: Tree parity machine-based one-time password authentication schemes. In: Proceedings of the

International Joint Conference on Neural Networks, pp. 257-261. (2008)

68. Chen, T.-Y., Lee, C.-C., Hwang, M.-S., Jan, J.-K.: Towards secure and efficient user authentication scheme using

smart card for multi-server environments. The Journal of Supercomputing 66, 1008-1032 (2013)

69. Chen, Y., Chou, J.-S., Sun, H.-M.: A novel mutual authentication scheme based on quadratic residues for RFID

systems. Computer Networks 52, 2373-2380 (2008)

70. Chen, Y., Chou, J.-S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic

Commerce Research 15, 97-120 (2015)

71. Chen, Y., Shu, J., Yang, F., Chen, H.: User authentication and data cryptograph system based on biometric key for

wireless sensor networks. Journal of Computational Information Systems 9, 3949-3959 (2013)

72. Cheng, F.: A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password

Token. In: 2010 IEEE 34th Annual Computer Software and Applications Conference, pp. 147-154. (2010)

73. Cheng, F.: Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption

Algorithm. Mobile Networks and Applications 16, 304-336 (2011)

74. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication scheme for remote user login and

verification. International Journal of Innovative Computing, Information and Control 8, 5499-5511 (2012)

75. Cheul Shin, K., Jong Oh, K.: Smartcard-based remote authentication scheme preserving user anonymity.

International Journal of Information Processing and Management 4, 10-18 (2013)

76. Chiang, H.-Y., Chiasson, S.: Improving user authentication on mobile devices: a touchscreen graphical password.

Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services.

ACM, Munich, Germany (2013)

77. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International

Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp. 245-

248. IEEE, (2005)

78. Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: A hash-based

radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with

Applications 69, 58-65 (2015)

79. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication

protocol using a secret value. Computer Communications 34, 391-397 (2011)

80. Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code.

In: Proceedings - 2011 International Conference on Mobile IT-Convergence, ICMIC 2011, pp. 109-113. (2011)

81. Choi, S., Zage, D.: Addressing insider threat using “where you are” as fourth factor authentication. In: Security

Technology (ICCST), 2012 IEEE International Carnahan Conference on, pp. 147-153. (2012)

82. Chou, J.-S.: An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of

Supercomputing 70, 75-94 (2014)

83. Chowdhury, S., Poet, R., Mackenzie, L.: Passhint: memorable and secure authentication. Proceedings of the 32nd

annual ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014)

84. Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.: Outsourceable two-party privacy-preserving biometric

authentication. Proceedings of the 9th ACM symposium on Information, computer and communications security.

ACM, Kyoto, Japan (2014)

85. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a

smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information,

Computer and Communications Security, pp. 249-259. ACM, (2011)

86. Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication.

Computers & Security 39, Part B, 127-136 (2013)

87. Dabbah, M., Woo, W., Dlay, S.: Secure authentication for face recognition. In: Computational Intelligence in Image

and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, pp. 121-126. IEEE, (2007)

88. Das, A.K., Bruhadeshwar, B.: An Improved and Effective Secure Password-Based Authentication and Key

Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. Journal of Medical Systems

37, 1-17 (2013)

89. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for

hierarchical wireless sensor networks. Journal of Network and Computer Applications 35, 1646-1656 (2012)

90. Das, R.K., Jelil, S., Mahadeva Prasanna, S.R.: Development of Multi-Level Speech based Person Authentication

System. Journal of Signal Processing Systems 1-13 (2016)

91. David, D.B., Rajappa, M., Karupuswamy, T., Iyer, S.P.: A Dynamic-Identity Based Multimedia Server Client

Authentication Scheme for Tele-Care Multimedia Medical Information System. Wireless Personal Communications

85, 241-261 (2015)

92. De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN: securing PIN entry through indirect input. In: Proceedings

of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103-1106. ACM, (2010)

93. De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: FIRME: Face and Iris Recognition for Mobile Engagement. Image

and Vision Computing 32, 1161-1172 (2014)

94. De Marsico, M., Nappi, M., Riccio, D.: Face authentication with undercontrolled pose and illumination. Signal,

Image and Video Processing 5, 401-413 (2011)

95. Denning, T., Bowers, K., Dijk, M.v., Juels, A.: Exploring implicit memory for painless password recovery.

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada

(2011)

96. Dhamija, R., Perrig, A.: Deja Vu-A User Study: Using Images for Authentication. In: USENIX Security Symposium,

pp. 4-4. (2000)

97. Dhamija, R.: Hash visualization in user authentication. CHI '00 Extended Abstracts on Human Factors in Computing

Systems. ACM, The Hague, The Netherlands (2000)

98. Dhondge, K., Choi, B.Y., Song, S., Park, H.: Optical Wireless authentication for smart devices using an onboard

ambient light sensor. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN),

pp. 1-8. (2014)

99. Ding, Y., Zhuang, D., Wang, K.: A study of hand vein recognition method. In: IEEE International Conference

Mechatronics and Automation, 2005, pp. 2106-2110. IEEE, (2005)

100. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in

mobile RFID systems. Ad Hoc Networks 11, 383-396 (2013)

101. Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A minimum disclosure approach to authentication and privacy

in RFID systems. Computer Networks 56, 3401-3416 (2012)

102. Drosou, A., Ioannidis, D., Moustakas, K., Tzovaras, D.: Spatiotemporal analysis of human activities for biometric

authentication. Computer Vision and Image Understanding 116, 411-421 (2012)

103. Drosou, A., Ioannidis, D., Tzovaras, D., Moustakas, K., Petrou, M.: Activity related authentication using prehension

biometrics. Pattern Recognition 48, 1743-1759 (2015)

104. Drosou, A., Moustakas, K., Tzovaras, D.: Event-based unobtrusive authentication using multi-view image sequences.

Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in

imagery streams. ACM, Firenze, Italy (2010)

105. Duc, B., Maître, G., Fischer, S., Bigün, J.: Person authentication by fusing face and speech information. In:

International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 311-318. Springer, (1997)

106. Dutta, R.: Converting group key agreement protocol into password-based setting - Case study. Journal of Computers

2, 26-33 (2007)

107. Emam, A.H.M.: Additional authentication and authorization using registered email-ID for cloud computing.

International Journal of Soft Computing and Engineering 3, 110-113 (2013)

108. English, R., Poet, R.: Towards a metric for recognition-based graphical password security. Proceedings - 2011 5th

International Conference on Network and System Security, NSS 2011 239-243 (2011)

109. Everts, M., Hoepman, J.-H., Siljee, J.: UbiKiMa: ubiquitous authentication using a smartphone, migrating from

passwords to strong cryptography. Proceedings of the 2013 ACM workshop on Digital identity management. ACM,

Berlin, Germany (2013)

110. Fahmi, P.A., Kodirov, E., Choi, D.-J., Lee, G.-S., Azli, A.M.F., Sayeed, S.: Implicit authentication based on ear

shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man,

and Cybernetics (SMC), pp. 2272-2276. IEEE, (2012)

111. Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using

encrypted biometrics. Proceedings of the 12th ACM workshop on Multimedia and security. ACM, Roma, Italy

(2010)

112. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security

24, 619-628 (2005)

113. Fan, J.W., Chan, C.W., Chang, Y.F.: A random increasing sequence hash chain and smart card-based remote user

authentication scheme. In: ICICS 2013 - Conference Guide of the 9th International Conference on Information,

Communications and Signal Processing. (2013)

114. Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y.: An ultra-lightweight RFID authentication scheme for mobile

commerce. Peer-to-Peer Networking and Applications 1-9 (2016)

115. Fan, R., He, D.-j., Pan, X.-z., Ping, L.-d.: An efficient and DoS-resistant user authentication scheme for two-tiered

wireless sensor networks. Journal of Zhejiang University SCIENCE C 12, 550-560 (2011)

116. Fan, Y.T., Su, G.P.: Design of two-way one-time-password authentication scheme based on true random numbers. In:

2nd International Workshop on Computer Science and Engineering, WCSE 2009, pp. 11-14. (2009)

117. Farash, M.S., Kumari, S., Bakhtiari, M.: Cryptanalysis and improvement of a robust smart card secured

authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications 75, 4485-4504

(2016)

118. Farash, M.S.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic

curve cryptography. The Journal of Supercomputing 70, 987-1001 (2014)

119. Flior, E., Kowalski, K.: Continuous biometric user authentication in online examinations. In: ITNG2010 - 7th

International Conference on Information Technology: New Generations, pp. 488-492. (2010)

120. Fong, S., Zhuang, Y., Fister, I.: A biometric authentication model using hand gesture images. BioMedical

Engineering OnLine 12, 1-18 (2013)

121. Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical

passwords. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta,

Georgia, USA (2010)

122. Frankel, A.D., Maheswaran, M.: Feasibility of a socially aware authentication scheme. In: 2009 6th IEEE Consumer

Communications and Networking Conference, CCNC 2009. (2009)

123. Fridman, L., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision

fusion for continuous authentication. Computers & Electrical Engineering 41, 142-156 (2015)

124. Gafurov, D., Bours, P., Snekkenes, E.: User authentication based on foot motion. Signal, Image and Video

Processing 5, 457-467 (2011)

125. Giot, R., El-Abed, M., Hemery, B., Rosenberger, C.: Unconstrained keystroke dynamics authentication with shared

secret. Computers & Security 30, 427-445 (2011)

126. Gnanaraj, J.W.K., Ezra, K., Rajsingh, E.B.: Smart card based time efficient authentication scheme for global grid

computing. Human-centric Computing and Information Sciences 3, 1-14 (2013)

127. Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. CHI '02 Extended Abstracts on

Human Factors in Computing Systems. ACM, Minneapolis, Minnesota, USA (2002)

128. Gong, L., Pan, J., Liu, B., Zhao, S.: A novel one-time password mutual authentication scheme on sharing renewed

finite random sub-passwords. Journal of Computer and System Sciences 79, 122-130 (2013)

129. Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of

the mobile user in global mobility networks. Journal of Network and Computer Applications 62, 1-8 (2016)

130. Gope, P., Hwang, T.: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User

Anonymity in Global Mobile Networks. Wireless Personal Communications 82, 2231-2245 (2015)

131. Goutham, R.A., Kim, D.S., Yoo, K.Y.: Implicit graphical password mutual authentication using mirror-image

encryption. In: Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, pp. 218-223.

(2014)

132. Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement

protocol on ECC using smart cards. Proceedings of the 30th Annual ACM Symposium on Applied Computing.

ACM, Salamanca, Spain (2015)

133. Grover, J., Hanmandlu, M.: Hybrid fusion of score level and adaptive fuzzy decision level fusions for the finger-

knuckle-print based authentication. Applied Soft Computing Journal 31, 1-13 (2015)

134. Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through

hand gesture recognition. International Journal of Information Security 11, 65-83 (2012)

135. Gugenheimer, J., Luca, A.D., Hess, H., Karg, S., Wolf, D., Rukzio, E.: ColorSnakes: Using Colored Decoys to

Secure Authentication in Sensitive Contexts. Proceedings of the 17th International Conference on Human-Computer

Interaction with Mobile Devices and Services. ACM, Copenhagen, Denmark (2015)

136. Gugenheimer, J., Schaub, F., Neiswander, G.M., Guneratne, E., Weber, M.: User Authentication for Rotary Knob

Controlled In-car Applications. Proceedings of the 6th International Conference on Automotive User Interfaces and

Interactive Vehicular Applications. ACM, Seattle, WA, USA (2014)

137. Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: An Improved Biometrics-Based Authentication Scheme for Telecare

Medical Information Systems. Journal of Medical Systems 39, 1-10 (2015)

138. Gupta, P., Gupta, P.: Multi-modal fusion of palm-dorsa vein pattern for accurate personal authentication.

Knowledge-Based Systems 81, 117-130 (2015)

139. Gupta, P., Srivastava, S., Gupta, P.: An accurate infrared hand geometry and vein pattern based authentication

system. Knowledge-Based Systems 103, 143-155 (2016)

140. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., Fu, H.: MAPS: A Multi-Dimensional Password Scheme for

Mobile Authentication. Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces.

ACM, Madeira, Portugal (2015)

141. Gurav, S.M., Gawade, L.S., Rane, P.K., Khochare, N.R.: Graphical password authentication: Cloud securing scheme.

In: Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies,

ICESC 2014, pp. 479-483. (2014)

142. Gurung, B., Prasad, P.W.C., Alsadoon, A., Elchouemi, A.: Enhanced Virtual Password Authentication Scheme

Resistant to Shoulder Surfing. In: 2015 Second International Conference on Soft Computing and Machine

Intelligence (ISCMI), pp. 134-139. (2015)

143. Gy, odor, Szendi, t., Imre, n.: Elliptic curve cryptography based authentication protocol for small computational

capacity RFID systems. Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile

networks. ACM, Bodrum, Turkey (2010)

144. Habib, K., Torjusen, A., Leister, W.: A novel authentication framework based on bio-metric and radio fingerprinting

for the IoT in eHealth. In: Proceedings of International Conference on Smart Systems, Devices and Technologies

(SMART), pp. 32-37. (2014)

145. Hafizul Islam, S.K., Biswas, G.P.: Design of improved password authentication and update scheme based on elliptic

curve cryptography. Mathematical and Computer Modelling 57, 2703-2717 (2013)

146. Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a security token for unified authentication. In: 2007 Second

International Conference on Systems and Networks Communications (ICSNC 2007), pp. 68-68. IEEE, (2007)

147. Hammouri, G., Öztürk, E., Sunar, B.: A tamper-proof and lightweight authentication scheme. Pervasive and Mobile

Computing 4, 807-818 (2008)

148. Hang, A., Luca, A.D., Hussmann, H.: I Know What You Did Last Week! Do You?: Dynamic Security Questions for

Fallback Authentication on Smartphones. Proceedings of the 33rd Annual ACM Conference on Human Factors in

Computing Systems. ACM, Seoul, Republic of Korea (2015)

149. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A Chaotic Map-based Authentication Scheme for Telecare Medicine

Information Systems. Journal of Medical Systems 37, 1-7 (2013)

150. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java

SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture

Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010)

151. He, D., Chen, J., Chen, Y.: A secure mutual authentication scheme for session initiation protocol using elliptic curve

cryptography. Security and Communication Networks 5, 1423-1429 (2012)

152. He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement

scheme with pseudo identity for wireless sensor networks. Information Sciences 321, 263-277 (2015)

153. He, D., Wang, D.: Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Systems

Journal 9, 816-823 (2015)

154. Herzberg, A., Margulies, R.: My authentication album: Adaptive images-based login mechanism. In: IFIP

International Information Security Conference, pp. 315-326. Springer, (2012)

155. Hintze, D., Findling, R.D., Muaaz, M., Koch, E., Ren, Mayrhofer: Cormorant: towards continuous risk-aware multi-

modal cross-device authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on

Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable

Computers. ACM, Osaka, Japan (2015)

156. Hoang, T., Choi, D., Nguyen, T.: Gait authentication on mobile phone using biometric cryptosystem and fuzzy

commitment scheme. International Journal of Information Security 14, 549-560 (2015)

157. Hocquet, S., Ramel, J.-Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. In: Fourth IEEE

Workshop on Automatic Identification Advanced Technologies (AutoID'05), pp. 224-229. IEEE, (2005)

158. Hong, F., Wei, M., You, S., Feng, Y., Guo, Z.: Waving Authentication: Your Smartphone Authenticate You on

Motion Gesture. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in

Computing Systems. ACM, Seoul, Republic of Korea (2015)

159. Hong, S.: Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking

Techniques 1-7 (2015)

160. Hsieh, C.-Y., Lin, W.-Y.: Video-based human action and hand gesture recognition by fusing factored matrices of

dual tensors. Multimedia Tools and Applications 1-20 (2016)

161. Hsieh, W.B., Leu, J.S.: Design of a time and location based One-Time Password authentication scheme. In: IWCMC

2011 - 7th International Wireless Communications and Mobile Computing Conference, pp. 201-206. (2011)

162. Hu, L.-l., Niu, X.-x., Yang, Y.-x.: Weaknesses and improvements of a remote user authentication scheme using smart

cards. The Journal of China Universities of Posts and Telecommunications 14, 91-94 (2007)

163. Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein authentication based on wide line detector and pattern

normalization. In: International Conference on Pattern Recognition (ICPR), 2010 20th, pp. 1269-1272. IEEE, (2010)

164. Huang, H.F., Chang, H.W., Yu, P.K.: Enhancement of timestamp-based user authentication scheme with smart card.

International Journal of Network Security 16, 463-467 (2014)

165. Huang, Y., Huang, Z., Zhao, H., Lai, X.: A new One-time Password Method. IERI Procedia 4, 32-37 (2013)

166. Huang, Y.L., Lu, P.H., Tygar, J.D., Joseph, A.D.: OSNP: Secure wireless authentication protocol using one-time key.

Computers & Security 28, 803-815 (2009)

167. Hussain, A., Bhuiyan, A., Mian, A., Ramamohanarao, K.: Biometric Security Application for Person Authentication

Using Retinal Vessel Feature. In: International Conference on Digital Image Computing: Techniques and

Applications (DICTA), 2013, pp. 1-8. (2013)

168. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on

Communications E85-B, 823-825 (2002)

169. Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Transactions on

Consumer Electronics 46, 28-30 (2000)

170. Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. International

Journal of Computer Mathematics 70, 657-666 (1999)

171. Hwang, S.-s., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers & Security

28, 85-93 (2009)

172. Hwang, S.-s., Lee, H.-j., Cho, S.: Improving authentication accuracy using artificial rhythms and cues for keystroke

dynamics-based authentication. Expert Systems with Applications 36, 10649-10656 (2009)

173. Imtiaz, H., Fattah, S.A.: A face recognition scheme using wavelet-based local features. In: Computers & Informatics

(ISCI), 2011 IEEE Symposium on, pp. 313-316. (2011)

174. Imtiaz, H., Fattah, S.A.: A wavelet-domain local feature selection scheme for face recognition. In: International

Conference on Communications and Signal Processing (ICCSP), 2011, pp. 448-451. (2011)

175. Islam, M., Hasan, M.M., Farhad, M.M., Tanni, T.R.: Human authentication process using finger knuckle surface with

artificial Neural Networks based on a hybrid feature selection method. In: Proceeding of the 15th International

Conference on Computer and Information Technology, ICCIT 2012, pp. 61-64. (2012)

176. Islam, M.S.: Heartbeat biometrics for remote authentication using sensor embedded computing devices. International

Journal of Distributed Sensor Networks 2015, (2015)

177. Islam, S.K.H., Biswas, G.P.: Improved remote login scheme based on ECC. In: International Conference on Recent

Trends in Information Technology (ICRTIT), 2011, pp. 1221-1226. (2011)

178. Islam, S.K.H., Khan, M.K., Obaidat, M.S., Muhaya, F.T.B.: Provably Secure and Anonymous Password

Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wireless

Personal Communications 84, 2013-2034 (2015)

179. Jagadiswary, D., Saraswady, D.: Biometric Authentication Using Fused Multimodal Biometric. Procedia Computer

Science 85, 109-116 (2016)

180. Jain, A., Hong, L., Kulkarni, Y.: A multimodal biometric system using fingerprint, face and speech. In: Proceedings

of 2nd Int'l Conference on Audio-and Video-based Biometric Person Authentication, Washington DC, pp. 182-187.

(1999)

181. Jain, A., Kanhangad, V.: Exploring orientation and accelerometer sensor data for personal authentication in

smartphones using touchscreen gestures. Pattern Recognition Letters 68, Part 2, 351-360 (2015)

182. Jakobsson, M., Yang, L., Wetzel, S.: Quantifying the security of preference-based authentication. Proceedings of the

4th ACM workshop on Digital identity management. ACM, Alexandria, Virginia, USA (2008)

183. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R.: Graphical password authentication scheme for

embedded platform. Journal of Artificial Intelligence 7, 161-171 (2014)

184. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications.

International Journal of Security and its Applications 7, 1-16 (2013)

185. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home

networks. In: Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, pp. 294-294.

IEEE, (2008)

186. Jiang, L., Li, X., Cheng, L.L., Guo, D.: Identity authentication scheme of cloud storage for user anonymity via USB

token. In: Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification, ASID.

(2013)

187. Jiang, P., Wen, Q., Li, W., Jin, Z., Zhang, H.: An anonymous and efficient remote biometrics user authentication

scheme in a multi server environment. Frontiers of Computer Science 9, 142-156 (2015)

188. Jiang, Q., Li, G.S., Ma, J.F.: Security flaws and improvement of an ID-based wireless authentication scheme with

anonymity. Tongxin Xuebao/Journal on Communications 31, 209-216 (2010)

189. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service

in global mobility networks. Wireless Personal Communications 68, 1477-1491 (2013)

190. Jiang, Q., Ma, J., Ma, Z., Li, G.: A Privacy Enhanced Authentication Scheme for Telecare Medical Information

Systems. Journal of Medical Systems 37, 1-8 (2013)

191. Jin, Z., Teoh, A.B.J., Thian, S.O., Tee, C.: Typing dynamics biometric authentication through fuzzy logic. In:

Proceedings - International Symposium on Information Technology 2008, ITSim. (2008)

192. Jo, J., Kim, Y., Lee, S.: Mindmetrics: Identifying users without their login IDs. In: 2014 IEEE International

Conference on Systems, Man, and Cybernetics (SMC), pp. 2121-2126. (2014)

193. Joshi, S.S., Phoha, V.V.: Competition between SOM clusters to model user authentication system in computer

networks. In: Proceedings of the 2007 2nd International Conference on Communication System Software and

Middleware and Workshops, COMSWARE 2007. (2007)

194. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33, 168-176 (1990)

195. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based

authentication system for smartphones. Security and Communication Networks (2014)

196. Kang, B.J., Park, K.R.: A new multi-unit iris authentication based on quality assessment and score level fusion for

mobile phones. Machine Vision and Applications 21, 541-553 (2010)

197. Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input

devices. Information Sciences 308, 72-93 (2015)

198. Karuppiah, M., Saravanan, R.: A Secure Authentication Scheme with User Anonymity for Roaming Service in

Global Mobility Networks. Wireless Personal Communications 84, 2055-2078 (2015)

199. Khakzar, M., Pourghassem, H.: Human authentication algorithm using spectral feature of retinal fundus image.

International Journal of Tomography and Simulation 28, 23-38 (2015)

200. Khamis, M., Alt, F., Hassib, M., Zezschwitz, E.v., Hasholzner, R., Bulling, A.: GazeTouchPass: Multimodal

Authentication Using Gaze and Touch on Mobile Devices. Proceedings of the 2016 CHI Conference Extended

Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016)

201. Khan, G.N., Moessner, M.: Low-cost authentication protocol for passive, computation capable RFID tags. Wireless

Networks 21, 565-580 (2015)

202. Khan, M.K., Alghathbar, K., Zhang, J.: Privacy-preserving and tokenless chaotic revocable face authentication

scheme. Telecommunication Systems 47, 227-234 (2011)

203. Khot, R.A., Srinathan, K., Khot, R.A.: NAPTune: fine tuning graphical authentication. Proceedings of the 3rd

International Conference on Human Computer Interaction. ACM, Bangalore, India (2011)

204. Khot, R.A., Srinathan, K., Kumaraguru, P.: MARASIM: a novel jigsaw based authentication scheme using tagging.

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada

(2011)

205. Khoury, E., El Shafey, L., McCool, C., Günther, M., Marcel, S.: Bi-modal biometric authentication on mobile phones

in challenging conditions. Image and Vision Computing 32, 1147-1160 (2014)

206. Kikuchi, H., Nagai, K., Ogata, W., Nishigaki, M.: Privacy-preserving similarity evaluation and application to remote

biometrics authentication. Soft Computing 14, 529-536 (2010)

207. Kim, S.K., Chung, M.G.: More secure remote user authentication scheme. Computer Communications 32, 1018-1021

(2009)

208. Kotropoulos, C., Tefas, A., Pitas, I.: Frontal face authentication using morphological elastic graph matching. IEEE

Transactions on Image Processing 9, 555-560 (2000)

209. Kratz, S., Aumi, M.T.I.: AirAuth: a biometric authentication system using in-air hand gestures. CHI '14 Extended

Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada (2014)

210. Krause, M.: A behavioral biometrics based authentication method for MOOC's that is robust against imitation

attempts. Proceedings of the first ACM conference on Learning @ scale conference. ACM, Atlanta, Georgia, USA

(2014)

211. Kuber, R., Sharma, S.: Toward tactile authentication for blind users. Proceedings of the 12th international ACM

SIGACCESS conference on Computers and accessibility. ACM, Orlando, Florida, USA (2010)

212. Kuber, R., Yu, W.: Feasibility study of tactile-based authentication. International Journal of Human-Computer

Studies 68, 158-181 (2010)

213. Kulkarni, S., Raut, R.D., Dakhole, P.K.: A Novel Authentication System Based on Hidden Biometric Trait. Procedia

Computer Science 85, 255-262 (2016)

214. Kulkarni, S., Raut, R.D., Dakhole, P.K.: Wavelet Based Modern Finger Knuckle Authentication. Procedia Computer

Science 70, 649-657 (2015)

215. Kumar, A., Garg, S., Hanmandlu, M.: Biometric authentication using finger nail plates. Expert Systems with

Applications 41, 373-386 (2014)

216. Kumar, A., Zhang, D.: Integrating palmprint with face for user authentication. In: Workshop on Multimodal User

Authentication (MMUA 2003), pp. 107-112. Citeseer, (2003)

217. Kumar, A., Zhang, D.: Personal recognition using hand shape and texture. IEEE Transactions on Image Processing

15, 2454-2461 (2006)

218. Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics

50, 597-600 (2004)

219. Kumar, N., Kaur, K., Misra, S.C., Iqbal, R.: An intelligent RFID-enabled authentication scheme for healthcare

applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications 1-17 (2015)

220. Kumar, T.R., Raghavan, S.: PassPattern System (PPS): a pattern-based user authentication scheme. In: International

Conference on Research in Networking, pp. 162-169. Springer, (2008)

221. Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication

scheme for session initiation protocol. Peer-to-Peer Networking and Applications 1-14 (2015)

222. Kumari, S., Gupta, M.K., Kumar, M.: Cryptanalysis and security enhancement of Chen et al.’s remote user

authentication scheme using smart card. Central European Journal of Computer Science 2, 60-75 (2012)

223. Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart

card. International Journal of Communication Systems 29, 441-458 (2016)

224. Kumari, S., Om, H.: A modified remote authentication method with smartcards and check digits. In: Proceedings -

2014 International Conference on Data Science and Engineering, ICDSE 2014, pp. 206-209. (2014)

225. Kuribara, T., Shizuki, B., Tanaka, J.: Vibrainput: two-step PIN entry system based on vibration and visual

information. CHI '14 Extended Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada

(2014)

226. Kwon, T., Hong, J.: Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording

Attacks. IEEE Transactions on Information Forensics and Security 10, 278-292 (2015)

227. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770-772

(1981)

228. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for

wireless environments. IEEE Transactions on Industrial Electronics 53, 1683-1687 (2006)

229. Lee, C.-C., Hwang, M.-S., Yang, W.-P.: A flexible remote user authentication scheme using smart cards. SIGOPS

Oper. Syst. Rev. 36, 46-52 (2002)

230. Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user authentication scheme using hash functions. SIGOPS Oper. Syst.

Rev. 36, 23-29 (2002)

231. Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID based remote user authentication scheme for multi-server

environment using smart cards. Expert Systems with Applications 38, 13863-13870 (2011)

232. Lee, C.-Y., Lin, C.-H., Chang, C.-C.: An improved low computation cost user authentication scheme for mobile

communication. In: 19th International Conference on Advanced Information Networking and Applications

(AINA'05) Volume 1 (AINA papers), pp. 249-252. IEEE, (2005)

233. Lee, G., Jun-bin, C.A.O., Haitao, Y., Lili, D.: International Conference on Solid State Devices and Materials Science,

April 1-2, 2012, MacaoEyebrows Identity Authentication Based on Wavelet Transform and Support Vector

Machines. Physics Procedia 25, 1337-1341 (2012)

234. Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme for site authentication. In: Lecture Notes in Computer

Science, pp. 111-116. (2005)

235. Lee, J., Park, H., Bang, G., Song, J.: POSTER: A Password-based Authentication by Splitting Roles of User

Interface. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM,

Denver, Colorado, USA (2015)

236. Lee, N.Y., Chiu, Y.C.: Improved remote authentication scheme with smart card. Computer Standards and Interfaces

27, 177-180 (2005)

237. Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In:

Symposium on cryptography and information security. (2006)

238. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improved efficient remote user authentication scheme using smart cards. IEEE

Transactions on Consumer Electronics 50, 565-567 (2004)

239. Lee, T.-F.: An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for

Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-9 (2013)

240. Lee, Y., Chung, Y., Moon, K.: Secure face authentication framework in open networks. ETRI Journal 32, 950-960

(2010)

241. Lee, Y., Kim, J., Jeon, W., Won, D.: Design of a simple user authentication scheme using QR-code for mobile

device. Information Technology Convergence, Secure and Trust Computing, and Data Management, pp. 241-247.

Springer (2012)

242. Lee, Y.S., Kim, E., Jung, M.S.: A smart card based user authentication scheme for multi-server environment. In:

Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication,

ICUIMC 2011. (2011)

243. Leea, W.B., Chen, T.H., Sun, W.R., Ho, K.I.J.: An S/Key-like one-time password authentication scheme using smart

cards for smart meter. In: Proceedings - 2014 IEEE 28th International Conference on Advanced Information

Networking and Applications Workshops, IEEE WAINA 2014, pp. 281-286. (2014)

244. Leftheriotis, I.: User authentication in a multi-touch surface: a chord password system. CHI '13 Extended Abstracts

on Human Factors in Computing Systems. ACM, Paris, France (2013)

245. Leicher, A., Schmidt, A.U., Shah, Y.: Smart OpenID: a smart card based OpenID protocol. In: IFIP International

Information Security Conference, pp. 75-86. Springer, (2012)

246. León-Coca, J.M., Reina, D.G., Toral, S.L., Barrero, F., Bessis, N.: Authentication Systems Using ID Cards over NFC

Links: The Spanish Experience Using DNIe. Procedia Computer Science 21, 91-98 (2013)

247. Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless

communications. Mathematical and Computer Modelling 55, 35-44 (2012)

248. Li, D., Sang, L., Yang, Y., Wu, Z.: Bimodal speaker identification using dynamic bayesian network. Lecture Notes in

Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),

vol. 3338, pp. 577-585 (2004)

249. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling.

International Journal of Information Security 13, 229-244 (2014)

250. Li, F., Wechsler, H.: Face authentication using recognition-by-parts, boosting and transduction. International Journal

of Pattern Recognition and Artificial Intelligence 23, 545-573 (2009)

251. Li, L., Zhao, X., Xue, G.: Unobservable Re-authentication for Smartphones. In: NDSS. (2013)

252. Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password authentication scheme for multiserver architecture using

neural networks. IEEE Transactions on Neural Networks 12, 1498-1504 (2001)

253. Li, X., Liao, J., Kumari, S., Liang, W., Wu, F., Khan, M.K.: A New Dynamic ID-Based User Authentication Scheme

Using Mobile Device: Cryptanalysis, the Principles and Design. Wireless Personal Communications 85, 263-288

(2015)

254. Li, X., Niu, J., Khan, M.K., Liao, J.: Security Analysis and Enhancement of a Dynamic Identity Based

Authentication Scheme Using Smart Cards. In: Biometrics and Security Technologies (ISBAST), 2013 International

Symposium on, pp. 149-154. (2013)

255. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W.: An enhancement of a smart card authentication scheme for multi-

server architecture. Wireless Personal Communications 80, 175-192 (2015)

256. Li, X., Niu, J., Liu, Y., Liao, J., Liang, W.: Robust dynamic ID-based remote user authentication scheme using smart

cards. International Journal of Ad Hoc and Ubiquitous Computing 17, 254-264 (2014)

257. Li, X., Wang, K., Shen, J., Kumari, S., Wu, F., Hu, Y.: An enhanced biometrics-based user authentication scheme for

multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing 7, 427-

443 (2016)

258. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: Secure privacy-preserving biometric authentication scheme for telecare

medicine information systems. Journal of medical systems 38, 1-8 (2014)

259. Li, X., Wen, Q., Zhang, H., Jin, Z.: An improved authentication with key agreement scheme on elliptic curve

cryptosystem for global mobility networks. International Journal of Network Management 23, 311-324 (2013)

260. Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: A secure image-based authentication scheme for mobile devices. In: Lecture

Notes in Computer Science, pp. 751-760. (2005)

261. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. Journal of

Computer and System Sciences 72, 727-740 (2006)

262. Liao, Y.-P., Hsiao, C.-M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer

protocol. Ad Hoc Networks 18, 133-146 (2014)

263. Liao, Y.P., Hsiao, C.M.: A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols. Smart

Innovation, Systems and Technologies, vol. 21, pp. 1-13 (2013)

264. Liaw, H.-T., Fan, S.-W., Wu, W.-C.: A simple password authentication using a polynomial. SIGOPS Oper. Syst.

Rev. 38, 74-79 (2004)

265. Lin, C.-L., Hwang, T.: A password authentication scheme with secure password updating. Computers & Security 22,

68-72 (2003)

266. Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new strong-password authentication scheme using one-way hash functions.

Journal of Computer and Systems Sciences International 45, 623-626 (2006)

267. Lin, I.-C., Chang, C.-C.: A countable and time-bound password-based user authentication scheme for the applications

of electronic commerce. Information Sciences 179, 1269-1277 (2009)

268. Lin, M.-H., Chang, C.-C.: A secure one-time password authentication scheme with low-computation for mobile

communications. SIGOPS Oper. Syst. Rev. 38, 76-84 (2004)

269. Lin, T.H., Shih, W.P., Chen, W.C., Ho, W.Y.: 3D face authentication by mutual coupled 3D and 2D feature

extraction. Proceedings of the 44th annual Southeast regional conference. ACM, Melbourne, Florida (2006)

270. Liou, J.C., Conway, J.: A single-factor dynamic authentication for computer systems with touch screens. In: 23rd

International Conference on Software Engineering and Data Engineering, SEDE 2014, pp. 31-36. (2014)

271. Liu, J., Yu, F.R., Lung, C.H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous

authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications 8, 806-815

(2009)

272. Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a

single tri-axis accelerometer. Proceedings of the 11th International Conference on Human-Computer Interaction with

Mobile Devices and Services. ACM, Bonn, Germany (2009)

273. Liu, J.Y., Zhou, A.M., Gao, M.X.: A new mutual authentication scheme based on nonce and smart cards. Computer

Communications 31, 2205-2209 (2008)

274. Lo, N., Tsai, J.: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks

Without Pairings. IEEE Transactions on Intelligent Transportation Systems (2015)

275. Lo, N.-W., Yeh, K.-H.: An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system.

In: International Conference on Embedded and Ubiquitous Computing, pp. 43-56. Springer, (2007)

276. Lo, N.W., Yeh, K.H.: Mutual RFID authentication scheme for resource-constrained tags. Journal of Information

Science and Engineering 26, 1875-1889 (2010)

277. Lopez, N., Rodriguez, M., Fellegi, C., Long, D., Schwarz, T.: Even or Odd: A Simple Graphical Authentication

System. IEEE Latin America Transactions 13, 804-809 (2015)

278. Loutrel, M., Urien, P., Gaïti, D.: Authentication in wireless networks: state of the art and integration with smart card.

Annales des Télécommunications 59, 130-148 (2004)

279. Lu, Y., Wu, X., Yang, X.: A secure anonymous authentication scheme for wireless communications using smart

cards. International Journal of Network Security 17, 237-245 (2015)

280. Luca, A.D., Harbach, M., Zezschwitz, E.v., Maurer, M.-E., Slawik, B.E., Hussmann, H., Smith, M.: Now you see

me, now you don't: protecting smartphone authentication from shoulder surfers. Proceedings of the 32nd annual

ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014)

281. Luca, A.D., Weiss, R., Hu, H., mann, An, X.: Eyepass - eye-stroke authentication for public terminals. CHI '08

Extended Abstracts on Human Factors in Computing Systems. ACM, Florence, Italy (2008)

282. Luca, A.D., Zezschwitz, E.v., Hu, H., mann: Vibrapass: secure authentication based on shared lies. Proceedings of

the SIGCHI Conference on Human Factors in Computing Systems. ACM, Boston, MA, USA (2009)

283. Luca, A.D., Zezschwitz, E.v., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., Langheinrich, M.: Back-

of-device authentication on smartphones. Proceedings of the SIGCHI Conference on Human Factors in Computing

Systems. ACM, Paris, France (2013)

284. Lumini, A., Nanni, L.: An advanced multi-modal method for human authentication featuring biometrics data and

tokenised random numbers. Neurocomputing 69, 1706-1710 (2006)

285. Maio, D., Nanni, L.: Multihashing, human authentication featuring biometrics data and tokenized random number: A

case study FVC2004. Neurocomputing 69, 242-249 (2005)

286. Maiorana, E., Campisi, P., Gonz, N., lez, C., Neri, A.: Keystroke dynamics authentication for mobile phones.

Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, TaiChung, Taiwan (2011)

287. Malempati, S., Mogalla, S.: Intrusion prevention by native language password authentication scheme.

Communications in Computer and Information Science, vol. 196 CCIS, pp. 239-248 (2011)

288. Manasa, N.L., Govardhan, A., Satyanarayana, C.H.: Fusion of multiple biometric traits: Fingerprint, palmprint and

iris. Intelligent Systems Reference Library, vol. 70, pp. 287-320 (2014)

289. Mandalapu, A., Daffney Deepa, V., Raj, L.D., Anish Dev, J.: An NFC featured three level authentication system for

tenable transaction and abridgment of ATM card blocking intricacies. In: Computing and Communication

(IEMCON), 2015 International Conference and Workshop on, pp. 1-6. (2015)

290. Maqsood, S., Chiasson, S., Girouard, A.: POSTER: Passwords on flexible display devices. Proceedings of the 2013

ACM SIGSAC conference on Computer & communications security. ACM, Berlin, Germany (2013)

291. Marcel, S., Millán, J.d.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model

adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 743-752 (2007)

292. Martínez-Peláez, R., Rico-Novella, F., Forné, J., Velarde-Alvarado, P.: Security Improvement of Two Dynamic ID-

based Authentication Schemes by Sood-Sarje-Singh. Journal of Applied Research and Technology 11, 755-763

(2013)

293. Matsuyama, Y., Shozawa, M., Yokote, R.: Brain signal׳s low-frequency fits the continuous authentication.

Neurocomputing 164, 137-143 (2015)

294. Medikonda, J., Madasu, H., B.K, P.: Information set based gait authentication system. Neurocomputing

295. Meng, Y., Wong, D.S., Kwok, L.-F.: Design of touch dynamics based user authentication with an adaptive

mechanism on mobile phones. Proceedings of the 29th Annual ACM Symposium on Applied Computing. ACM,

Gyeongju, Republic of Korea (2014)

296. Meng, Y., Wong, D.S., Schlegel, R.: Touch gestures based biometric authentication scheme for touchscreen mobile

phones. In: International Conference on Information Security and Cryptology, pp. 331-350. Springer, (2012)

297. Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings - 2012

IEEE 7th International Conference on Networking, Architecture and Storage, NAS 2012, pp. 39-48. (2012)

298. Mihajlov, M., Jerman-Blažič, B.: On designing usable and secure recognition-based graphical authentication

mechanisms. Interacting with Computers 23, 582-593 (2011)

299. Mir, O., Munilla, J., Kumari, S.: Efficient anonymous authentication with key agreement protocol for wireless

medical sensor networks. Peer-to-Peer Networking and Applications 1-13 (2015)

300. Mir, O., Nikooghadam, M.: A Secure Biometrics Based Authentication with Key Agreement Scheme in

Telemedicine Networks for E-Health Services. Wireless Personal Communications 83, 2439-2461 (2015)

301. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure and efficient ECC-based user anonymity-preserving session

initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 9, 171-192 (2016)

302. Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K.: Cryptanalysis and Improvement of Yan et

al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical

Systems 38, 1-12 (2014)

303. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A.: Security Enhancement of a Biometric based

Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems 38, 1-

11 (2014)

304. Mishra, D.: Design and Analysis of a Provably Secure Multi-server Authentication Scheme. Wireless Personal

Communications 86, 1095-1119 (2016)

305. Mishra, R., Barnwal, A.K.: A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical

Information Systems. Journal of Medical Systems 39, 1-10 (2015)

306. Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time continuous iris recognition for authentication using an eye

tracker. Proceedings of the 2012 ACM conference on Computer and communications security. ACM, Raleigh, North

Carolina, USA (2012)

307. Mock, P., Edelmann, r., Schilling, A., Rosenstiel, W.: User identification using raw sensor data from typing on

interactive displays. Proceedings of the 19th international conference on Intelligent User Interfaces. ACM, Haifa,

Israel (2014)

308. Mondal, A., Roy, K., Bhattacharya, P.: Secure and simplified access to home appliances using Iris recognition. In:

Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009. CIB 2009. IEEE Workshop

on, pp. 22-29. (2009)

309. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM conference on

Computer and communications security, pp. 48-56. ACM, (1997)

310. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Generation computer

systems 16, 351-359 (2000)

311. Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An Elliptic Curve-based Mutual Authentication Scheme for

RFID Implant Systems. Procedia Computer Science 32, 198-206 (2014)

312. Mudholkar, S.S., Shende, P.M., Sarode, M.V.: Biometrics authentication technique for intrusion detection systems

using fingerprint recognition. International Journal of Computer Science, Engineering and Information Technology 2,

57-65 (2012)

313. Nader, J., Alsadoon, A., Prasad, P.W.C., Singh, A.K., Elchouemi, A.: Designing Touch-Based Hybrid Authentication

Method for Smartphones. Procedia Computer Science 70, 198-204 (2015)

314. Nakakuni, M., Dozono, H., Tokushima, H., Noguchi, Y.: Application of self organizing maps for the integrated

authentication using keystroke timings and handwritten symbols. WSEAS Transactions on Information Science and

Applications 4, 413-420 (2007)

315. Nam, J., Choo, K.K.R., Paik, J.: A provably-anonymous authentication scheme for roaming services. International

Journal of Security and its Applications 10, 193-204 (2016)

316. Nam, J., Kim, M., Paik, J., Lee, Y., Won, D.: A provably-secure ECC-based authentication scheme for wireless

sensor networks. Sensors 14, 21023-21044 (2014)

317. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart

cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, 299-

302 (2007)

318. Nanni, L., Lumini, A.: Human authentication featuring signatures and tokenised random numbers. Neurocomputing

69, 858-861 (2006)

319. Nanni, L., Lumini, A.: Random subspace for an improved BioHashing for face authentication. Pattern Recognition

Letters 29, 295-300 (2008)

320. Nayak, A., Bansode, R.: Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points.

Procedia Computer Science 79, 553-560 (2016)

321. Nguyen, C.X., Huang, H.-H., Kawagoe, K.: POSTER: Graphical password using object-based image ranking.

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, Berlin,

Germany (2013)

322. Nguyen, T.A.T., Dang, T.K.: Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol. In:

2015 International Conference on Advanced Computing and Applications (ACOMP), pp. 1-6. (2015)

323. Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., Olivier, P.: A security assessment of tiles: a new portfolio-based

graphical authentication system. CHI '12 Extended Abstracts on Human Factors in Computing Systems. ACM,

Austin, Texas, USA (2012)

324. Nigam, A., Gupta, P.: Designing an accurate hand biometric based authentication system fusing finger knuckleprint

and palmprint. Neurocomputing 151, 1120-1132 (2015)

325. Nigam, A., Tiwari, K., Gupta, P.: Multiple texture information fusion for finger-knuckle-print authentication system.

Neurocomputing 188, 190-205 (2016)

326. Niinuma, K., Jain, A.K.: Continuous user authentication using temporal information. In: SPIE Defense, Security, and

Sensing, pp. 76670L-76670L-76611. International Society for Optics and Photonics, (2010)

327. Niinuma, K., Park, U., Jain, A.K.: Soft Biometric Traits for Continuous User Authentication. IEEE Transactions on

Information Forensics and Security 5, 771-780 (2010)

328. Nikolić, D., Vuksanović, B., Nguyen, C.: Attribute selection and intrusion detection for knowledge-based

authentication systems. In: Proceedings of the 12th IASTED International Conference on Artificial Intelligence and

Soft Computing, ASC 2008, pp. 202-207. (2008)

329. Nosseir, A., Connor, R., Renaud, K.: Question-based group authentication. Proceedings of the 18th Australia

conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments. ACM, Sydney,

Australia (2006)

330. Ntalianis, K., Tsapatsoulis, N., Drigas, A.: Video-Object Oriented Biometrics Hiding for User Authentication under

Error-Prone Transmissions. EURASIP Journal on Information Security 2011, 1-12 (2011)

331. Odelu, V., Das, A.K., Goswami, A.: An Effective and Robust Secure Remote User Authenticated Key Agreement

Scheme Using Smart Cards in Wireless Communication Systems. Wireless Personal Communications 84, 2571-2598

(2015)

332. O'Gorman, L., Bagga, A., Bentley, J.: Query-directed passwords. Computers & Security 24, 546-560 (2005)

333. O'Gorman, L., Sammon, M.J., Bentley, J., Skiba, D.J., Erhart, G.W.: Options for spoken human-computer

authentication in mobile environments. In: Proceedings of the 3rd IASTED International Conference on Human-

Computer Interaction, HCI 2008, pp. 230-235. (2008)

334. Onali, T., Ginesu, G.: Transmission-efficient image-based authentication for mobile devices. In: International

Workshop on Visual Content Processing and Representation, pp. 22-28. Springer, (2005)

335. Ota, H., Aoyama, S., Watanabe, R., Ito, K., Miyake, Y., Aoki, T.: Implementation and evaluation of a remote

authentication system using touchless palmprint recognition. Multimedia Systems 19, 117-129 (2013)

336. Ouda, O., Tsumura, N., Nakaguchi, T.: BioEncoding: A reliable tokenless cancelable biometrics scheme for

protecting iriscodes. IEICE Transactions on Information and Systems E93-D, 1878-1888 (2010)

337. Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iriscodes. In:

Proceedings - International Conference on Pattern Recognition, pp. 882-885. (2010)

338. Ouyang, H., Lee, T.: A new lip feature representation method for video-based bimodal authentication. Proceedings of

the 2005 NICTA-HCSNet Multimodal User Interaction Workshop - Volume 57. Australian Computer Society, Inc.,

Sydney, Australia (2006)

339. Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. International Journal

of Neural Systems 18, 59-66 (2008)

340. Park, M., Kita, Y., Aburada, K., Okazaki, N.: Proposal of a puzzle authentication method with shoulder-surfing

attack resistance. In: Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS

2014, pp. 495-500. (2014)

341. Part, Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi-

server authentication with key agreement scheme. Lecture Notes in Computer Science (including subseries Lecture

Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7335 LNCS, pp. 391-406 (2012)

342. Part, Kim, J., Jim, S.: Authentication and key agreement method for home networks using a smart card. Lecture

Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in

Bioinformatics), vol. 4705 LNCS, pp. 655-665 (2007)

343. Part, Yoo, S., Yoo, J., Park, P., Ryou, J.: A lightweight and stable authentication method for the internet access

control in smartphones. Communications in Computer and Information Science, vol. 251 CCIS, pp. 331-342 (2011)

344. Patel, A., Kalajdzic, K., Golafshan, L., Taghavi, M.: Design and implementation of a zero-knowledge authentication

framework for Java Card. International Journal of Information Security and Privacy 5, 1-18 (2011)

345. Pathan, A.-S.K., Hong, C.S.: Bilinear-pairing-based remote user authentication schemes using smart cards.

Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM,

Suwon, Korea (2009)

346. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., van der Lubbe, J.C.A.: Cryptanalysis of an EPC Class-1

Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence 24,

1061-1069 (2011)

347. Peris-Lopez, P., Lim, T.-L., Li, T.: Providing stronger authentication at a low cost to RFID tags operating under the

EPCglobal framework. In: International Conference on Embedded and Ubiquitous Computing, 2008. EUC'08.

IEEE/IFIP, pp. 159-166. IEEE, (2008)

348. Phan, D.T., Truong, T.T., Tran, M.T., Duong, A.D.: Two-way biometrics-based authentication scheme on mobile

devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture

Notes in Bioinformatics), vol. 8860, pp. 177-190 (2014)

349. Phua, K., Chen, J., Dat, T.H., Shue, L.: Heart sound as a biometric. Pattern Recognition 41, 906-919 (2008)

350. Pintor Maestre, D.: QRP: An improved secure authentication method using QR codes. (2012)

351. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Robust Smart Card Authentication Scheme for Multi-server Architecture.

Wireless Personal Communications 72, 729-745 (2013)

352. Pishva, D.: Spectroscopic Approach for Aliveness Detection in Biometrics Authentication. In: 2007 41st Annual

IEEE International Carnahan Conference on Security Technology, pp. 133-137. IEEE, (2007)

353. Podilchuk, C., Barinov, L., Hulbert, W., Jairaj, A.: Face recognition in a tactical environment. In: MILITARY

COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pp. 900-905. (2010)

354. Preuveneers, D., Joosen, W.: SmartAuth: dynamic context fingerprinting for continuous user authentication.

Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca, Spain (2015)

355. Qi, M., Lu, Y., Li, J., Li, X., Kong, J.: User-specific iris authentication based on feature selection. In: Proceedings -

International Conference on Computer Science and Software Engineering, CSSE 2008, pp. 1040-1043. (2008)

356. Qiao, M., Zhang, S., Sung, A.H., Liu, Q.: A Novel Touchscreen-Based Authentication Scheme Using Static and

Dynamic Hand Biometrics. In: Proceedings - International Computer Software and Applications Conference, pp.

494-503. (2015)

357. Rajasekaran, M.P., Suresh, M., Dhanasekaran, U.: Multimodal biometric recognition using sclera and fingerprint

based on ANFIS. In: 2014 International Conference on Recent Trends in Information Technology, ICRTIT 2014.

(2014)

358. Ramanathan, V., Wechsler, H.: Robust human authentication using appearance and holistic anthropometric features.

Pattern Recognition Letters 31, 2425-2435 (2010)

359. Ranjan, P., Om, H.: An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem.

Wireless Personal Communications 1-28 (2016)

360. Rathgeb, C., Uhl, A.: Secure iris recognition based on local intensity variations. In: International Conference Image

Analysis and Recognition, pp. 266-275. Springer, (2010)

361. Ray, P.P.: Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices.

International journal of computer trends and technology 3, 235-241 (2012)

362. Renaud, K.: A visuo-biometric authentication mechanism for older users. People and Computers XIX—The Bigger

Picture, pp. 167-182. Springer (2006)

363. Revett, K.: A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of

Control, Automation and Systems 7, 7-15 (2009)

364. Ribeiro, M.A.C., Scharcanski, J., Schuck, A.: An user identity authentication scheme adaptive to changes in face

appearance. In: Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE, pp. 1-5. (2011)

365. Ritter, D., Schaub, F., Walch, M., Weber, M.: MIBA: multitouch image-based authentication on smartphones. CHI

'13 Extended Abstracts on Human Factors in Computing Systems. ACM, Paris, France (2013)

366. Rohith, G., Bhuvaneswari, M., Kannaki, S.: Optimization of dynamic resistance against malicious attacks &

collusion through enhanced authentication schemes in application to smartcard. In: 2015 IEEE 7th National

Conference on Computing, Communication and Information Systems, NCCCIS 2015, pp. 5-10. (2015)

367. Roth, V., Schmidt, P., G, B., ldenring: The IR ring: authenticating users' touches on a multi-touch display.

Proceedings of the 23nd annual ACM symposium on User interface software and technology. ACM, New York, New

York, USA (2010)

368. Ryu, E.-K., Kim, D.-S., Yoo, K.-Y.: On Elliptic Curve Based Untraceable RFID Authentication Protocols.

Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, Portland, Oregon,

USA (2015)

369. Sadqi, Y., Asimi, A., Asimi, Y.: A Cryptographic Mutual Authentication Scheme for Web Applications. arXiv

preprint arXiv:1412.2908 (2014)

370. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on

multi-touch devices. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,

Austin, Texas, USA (2012)

371. Sae-Bae, N., Jakobsson, M.: Hand authentication on multi-touch tablets. Proceedings of the 15th Workshop on

Mobile Computing Systems and Applications. ACM, Santa Barbara, California (2014)

372. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Continuous user authentication using multi-modal biometrics.

Computers & Security 53, 234-246 (2015)

373. Safie, S.I., Soraghan, J.J., Petropoulakis, L.: Electrocardiogram (ECG) biometric authentication using pulse active

ratio (PAR). IEEE Transactions on Information Forensics and Security 6, 1315-1322 (2011)

374. Sagar, K., Waghmare, V.: “Measuring the Security and Reliability of Authentication of Social Networking Sites”.

Procedia Computer Science 79, 668-674 (2016)

375. Sakata, K., Maeda, T., Matsushita, M., Sasakawa, K., Tamaki, H.: Fingerprint authentication based on matching

scores with other data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial

Intelligence and Lecture Notes in Bioinformatics), vol. 3832 LNCS, pp. 280-286 (2006)

376. Samangouei, P., Patel, V.M., Chellappa, R.: Facial Attributes for Active Authentication on Mobile Devices. Image

and Vision Computing (2016)

377. Sandirigama, M., Shimizu, A.: Simple and secure password authentication protocol (SAS). IEICE Transactions on

Communications 83, 1363-1365 (2000)

378. Sarier, N.D.: A new approach for biometric template storage and remote authentication. In: International Conference

on Biometrics, pp. 909-918. Springer, (2009)

379. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Robust Biometric-Based Authentication Scheme for Wireless

Body Area Network Using Elliptic Curve Cryptosystem. Proceedings of the Third International Symposium on

Women in Computing and Informatics. ACM, Kochi, India (2015)

380. Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. Proceedings of the

SIGCHI Conference on Human Factors in Computing Systems. ACM, Florence, Italy (2008)

381. Sathish Babu, B., Venkataram, P.: Transaction based authentication scheme for mobile communication: A cognitive

agent based approach. In: Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS

2007; Abstracts and CD-ROM. (2007)

382. Schneegass, S., Oualil, Y., Bulling, A.: SkullConduct: Biometric User Identification on Eyewear Computers Using

Bone Conduction Through the Skull. Proceedings of the 2016 CHI Conference on Human Factors in Computing

Systems. ACM, Santa Clara, California, USA (2016)

383. Shanmugapriya, D., Padmavathi, G.: A wrapper based feature subset selection using ACO-ELM-ANP and GA-ELM-

ANP approaches for keystroke dynamics authentication. In: International Conference on Signal Processing, Image

Processing and Pattern Recognition 2013, ICSIPR 2013. (2013)

384. Shen, H., Gao, C., He, D., Wu, L.: New biometrics-based authentication scheme for multi-server environment in

critical systems. Journal of Ambient Intelligence and Humanized Computing 6, 825-834 (2015)

385. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: A modified remote user authentication scheme using smart cards. IEEE

Transactions on Consumer Electronics 49, 414-416 (2003)

386. Shen, Z.-h.: A new modified remote user authentication scheme using smart cards. Applied Mathematics-A Journal

of Chinese Universities 23, 371-376 (2008)

387. Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision tree-based method for user authentication based on

keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35, 826-833 (2005)

388. Shi, P., Zhu, B., Youssef, A.: A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. In: 2009 Third

International Conference on Emerging Security Information, Systems and Technologies, pp. 237-241. (2009)

389. Shi, W.-M., Yang, Y.-G., Zhou, Y.-H.: Quantum signature-masked authentication schemes. Optik - International

Journal for Light and Electron Optics 126, 3544-3548 (2015)

390. Shieh, W.G., Wang, M.T.: Improvement of chen et al.’s fingerprint biometric remote authentication scheme. ICIC

Express Letters 9, 1571-1575 (2015)

391. Shimizu, A., Horioka, T., Inagaki, H.: A password authentication method for contents communications on the

Internet. IEICE transactions on communications 81, 1666-1673 (1998)

392. Shimizu, A.: A dynamic password authentication method using a one‐way function. Systems and computers in Japan

22, 32-40 (1991)

393. Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: A smarter geolocation-based authentication

scheme. Security and Communication Networks 8, 3927-3938 (2015)

394. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on

elliptic curves for Internet of Things (IoT). In: Information Technology: Towards New Smart World (NSITNSW),

2015 5th National Symposium on, pp. 1-6. (2015)

395. Shuren, L., Qiuyan, Z., Chao, C., Yiqi, D.: A unidirectional one-time password authentication scheme without

counter desynchronization. In: 2009 Second ISECS International Colloquium on Computing, Communication,

Control, and Management, CCCM 2009, pp. 361-364. (2009)

396. Singh, Y.N., Singh, S.K., Gupta, P.: Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual

authentication system. Pattern Recognition Letters 33, 1932-1941 (2012)

397. Sodhi, B.: Using dropped call as an authentication factor. In: Proceedings - 15th IEEE International Conference on

Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing

and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure

Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom

2015, pp. 2031-2035. (2015)

398. Somayaji, A., Mould, D., Brown, C.: Towards narrative authentication: or, against boring authentication. Proceedings

of the 2013 workshop on New security paradigms workshop. ACM, Banff, Alberta, Canada (2013)

399. Sreeja, C.S., Misbahuddin, M.: A secure image-based authentication scheme employing DNA crypto and

steganography. In: ACM International Conference Proceeding Series, pp. 595-601. (2015)

400. Sreeramareddy, L., Miao, S., Feng, J.H.: Investigating gesture-based password: usability and vulnerability to

shoulder-surfing attacks. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems.

ACM, Towson, Maryland (2014)

401. Srinivasa, K.G., Gosukonda, S.: Continuous multimodal user authentication: coupling hard and soft biometrics with

support vector machines to attenuate noise. CSI Transactions on ICT 2, 129-140 (2014)

402. Sriram, J.C., Shin, M., Choudhury, T., Kotz, D.: Activity-aware ECG-based patient authentication for remote health

monitoring. Proceedings of the 2009 international conference on Multimodal interfaces. ACM, Cambridge,

Massachusetts, USA (2009)

403. Srisuk, S., Petrou, M., Kurutach, W., Kadyrov, A.: A face authentication system using the trace transform. Pattern

Analysis and Applications 8, 50-61 (2005)

404. Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN: Secure mobile transaction authentication. In: International

Conference on Availability, Reliability and Security, 2009. ARES'09., pp. 578-583. IEEE, (2009)

405. Sun, H.-M.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer

Electronics 46, 958-961 (2000)

406. Suoranta, S., Andrade, A., Aura, T.: Strong authentication with mobile phone. Lecture Notes in Computer Science

(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7483 LNCS,

pp. 70-85 (2012)

407. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. Proceedings

of the 7th workshop on Multimedia and security. ACM, New York, NY, USA (2005)

408. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations in feature vector structure in keystroke dynamics

authentication systems. Software Quality Journal 24, 137-157 (2016)

409. Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. In:

International Conference on Mobile Human-Computer Interaction, pp. 347-351. Springer, (2003)

410. Takada, T., Kokubun, Y.: Extended PIN authentication scheme allowing multi-touch key input. In: ACM

International Conference Proceeding Series, pp. 307-310. (2013)

411. Takada, T.: FakePointer: An authentication scheme for improving security against peeping attacks using video

cameras. In: Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services

and Technologies, UBICOMM 2008, pp. 395-400. (2008)

412. Tamrakar, S., Ekberg, J.-E., Asokan, N.: Identity verification schemes for public transport ticketing with NFC

phones. Proceedings of the sixth ACM workshop on Scalable trusted computing. ACM, Chicago, Illinois, USA

(2011)

413. Tan, Z.: Analysis and improvement of a user authentication improved protocol. Journal of Networks 5, 622-630

(2010)

414. Tan, Z.: Improvement on a password authentication scheme for multi-server environments. Journal of Convergence

Information Technology 6, 218-228 (2011)

415. Tang, Y., Hidenori, N., Urano, Y.: User authentication on smart phones using a data mining method. In: 2010

International Conference on Information Society, i-Society 2010, pp. 173-178. (2010)

416. Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: A multiple layer fusion approach on keystroke dynamics. Pattern

Analysis and Applications 14, 23-36 (2011)

417. Thiranant, N., Lee, H.: A Design of e-Healthcare Authentication Framework with QR Code. International Journal of

Security and Its Applications 8, 79-86 (2014)

418. Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of GeoPass: a geographic location-

password scheme. Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United

Kingdom (2013)

419. Thorpe, J., Oorschot, P.C.v., Somayaji, A.: Pass-thoughts: authenticating with our minds. Proceedings of the 2005

workshop on New security paradigms. ACM, Lake Arrowhead, California (2005)

420. Topkara, U., Atallah, M.J., Topkara, M.: Passwords decay, words endure: secure and re-usable multiple password

mnemonics. Proceedings of the 2007 ACM symposium on Applied computing. ACM, Seoul, Korea (2007)

421. Traore, I., Woungang, I., Obaidat, M.S., Nakkabi, Y., Lai, I.: Online risk-based authentication using behavioral

biometrics. Multimedia Tools and Applications 71, 575-605 (2014)

422. Trojahn, M., Ortmeier, F.: Biometric authentication through a virtual keyboard for smartphones. International Journal

of Computer Science & Information Technology 4, 1 (2012)

423. Truong, T.T., Tran, M.T., Duong, A.D.: Modified efficient and secure dynamic ID-based user authentication scheme.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in

Bioinformatics), vol. 7804 LNCS, pp. 409-415 (2013)

424. Tsai, J.-L., Lo, N.-W., Wu, T.-C.: A New Password-Based Multi-server Authentication Scheme Robust to Password

Guessing Attacks. Wireless Personal Communications 71, 1977-1988 (2013)

425. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table.

Computers & Security 27, 115-121 (2008)

426. Tsalakanidou, F., Malassiotis, S., Strintzis, M.G.: Exploitation of 3D images for face authentication under pose and

illumination variations. In: 3D Data Processing, Visualization and Transmission, 2004. 3DPVT 2004. Proceedings.

2nd International Symposium on, pp. 50-57. (2004)

427. Tseng, Y.-M., Wu, T.-Y., Wu, J.-D.: A pairing-based user authentication scheme for wireless clients with smart

cards. Informatica 19, 285-302 (2008)

428. Tsuchiya, T., Kihara, M., Berena, A.J.P.: Transmission time-based authentication scheme using 3G mobile device for

DRM system. In: 2009 IEEE International Frequency Control Symposium Joint with the 22nd European Frequency

and Time Forum, pp. 706-710. (2009)

429. Tullis, T.S., Tedesco, D.P.: Using personal photos as pictorial passwords. CHI '05 Extended Abstracts on Human

Factors in Computing Systems. ACM, Portland, OR, USA (2005)

430. Umar, M.S., Rafiq, M.Q.: Select-to-Spawn: A novel recognition-based graphical user authentication scheme. In:

2012 IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2012. (2012)

431. Usha, K., Ezhilarasan, M.: Robust personal authentication using finger knuckle geometric and texture features. Ain

Shams Engineering Journal (2016)

432. Vaidya, B., Park, J.H., Yeo, S.-S., Rodrigues, J.J.P.C.: Robust one-time password authentication scheme using smart

card for home network environment. Computer Communications 34, 326-336 (2011)

433. Van, H.T., Tat, P.Q., Le, T.H.: Palmprint verification using GridPCA for Gabor features. Proceedings of the Second

Symposium on Information and Communication Technology. ACM, Hanoi, Vietnam (2011)

434. Varenhorst, C., Kleek, M., Rudolph, L.: Passdoodles: A lightweight authentication method. Research Science

Institute (2004)

435. Vasuhi, S., Vaidehi, V., Babu, N.T.N., Treesa, T.M.: An efficient multi-modal biometric person authentication

system using Fuzzy Logic. In: 2010 2nd International Conference on Advanced Computing, ICoAC 2010, pp. 74-81.

(2010)

436. Venkat, I., De Wilde, P.: Robust Gait Recognition by Learning and Exploiting Sub-gait Characteristics. International

Journal of Computer Vision 91, 7-23 (2011)

437. Venkataram, P., Babu, B.S.: An authentication scheme for ubiquitous commerce: A cognitive agents based approach.

In: 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, pp. 248-256. (2008)

438. Vijilious, M.A.L., Ganapathy, S., Bharathi, V.S.: Palmprint feature extraction approach using nonsubsampled

contourlet transform and orthogonal moments. Proceedings of the International Conference on Advances in

Computing, Communications and Informatics. ACM, Chennai, India (2012)

439. Vo, D.L., Kim, K.: Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and

ECC. In: International Conference on Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP, pp.

144-147. (2007)

440. Vorugunti, C.S., Indukuri, S.S.V.: A Secure and Efficient BiometricAuthentication as a Service for Cloud

Computing. Proceedings of the 6th IBM Collaborative Academia Research Exchange Conference (I-CARE) on I-

CARE 2014. ACM, Bangalore, India (2014)

441. W, A., jtowicz, Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices.

Personal Ubiquitous Comput. 20, 195-207 (2016)

442. Wan, J., Bai, Z., Bai, X.: Secure group identity authentication based on non-perfect secret sharing scheme. In:

ICALIP 2012 - 2012 International Conference on Audio, Language and Image Processing, Proceedings, pp. 149-154.

(2012)

443. Wang, B., Ma, M.: A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme. Wireless

Personal Communications 68, 361-378 (2013)

444. Wang, B.J., Zhang, H.G., Wang, Y.H.: Secure password-based authentication scheme with anonymous identity

without smart cards. Tongxin Xuebao/Journal on Communications 29, 70-75 (2008)

445. Wang, C., Li, Y., Song, X.: Video-to-video face authentication system robust to pose variations. Expert Systems with

Applications 40, 722-735 (2013)

446. Wang, D., Ma, C.-g.: Cryptanalysis of a remote user authentication scheme for mobile client–server environment

based on ECC. Information Fusion 14, 498-503 (2013)

447. Wang, F., Han, J.: Multimodal biometric authentication based on score level fusion using support vector machine.

Opto-Electronics Review 17, 59-64 (2009)

448. Wang, J., Li, Y., Ao, X., Wang, C., Zhou, J.: Multi-modal biometric authentication fusing iris and palmprint based on

GMM. In: 2009 IEEE/SP 15th Workshop on Statistical Signal Processing, pp. 349-352. IEEE, (2009)

449. Wang, K., Zhang, Y., Yuan, Z., Zhuang, D.: Hand vein recognition based on multi supplemental features of multi-

classifier fusion decision. In: 2006 International Conference on Mechatronics and Automation, pp. 1790-1795. IEEE,

(2006)

450. Wang, P., Ku, C.-C., Wang, T.C.: A new fingerprint authentication scheme based on secret-splitting for enhanced

cloud security. Recent Application in Bio-metrics 183-196 (2011)

451. Wang, S.-Q., Wang, J.-Y., Li, Y.-Z.: The Web Security Password Authentication based the Single-block Hash

Function. IERI Procedia 4, 2-7 (2013)

452. Wang, X., Guo, F., Ma, J.-f.: User authentication via keystroke dynamics based on difference subspace and slope

correlation degree. Digital Signal Processing 22, 707-712 (2012)

453. Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user

authentication scheme using smart cards. Computer Standards and Interfaces 29, 507-512 (2007)

454. Wang, Y., Plataniotis, K.: Face based biometric authentication with changeable and privacy preservable templates.

In: Biometrics Symposium, 2007, pp. 1-6. IEEE, (2007)

455. Wang, Y., Plataniotis, K.: Face based biometric authentication with changeable and privacy preserving templates. In:

Biometric Symposium, BSYM. (2007)

456. Wang, Z., Huo, Z., Shi, W.: A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare

Medicine Information Systems. Journal of Medical Systems 39, 1-8 (2014)

457. Wang, Z., Jing, J., Li, L.: Time evolving graphical password for securing mobile devices. Proceedings of the 8th

ACM SIGSAC symposium on Information, computer and communications security. ACM, Hangzhou, China (2013)

458. Watanabe, Y., Houryu, Fujita, T.: Toward Introduction of Immunity-based Model to Continuous Behavior-based

User Authentication on Smart Phone. Procedia Computer Science 22, 1319-1327 (2013)

459. Wei, J., Hu, X., Liu, W.: Two‐factor authentication scheme using attribute and password. International Journal of

Communication Systems (2014)

460. Weiss, R., Luca, A.D.: PassShapes: utilizing stroke based authentication to increase password memorability.

Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges. ACM, Lund, Sweden

(2008)

461. Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Computers

& Electrical Engineering 38, 381-387 (2012)

462. Wen, F., Susilo, W., Yang, G.: A Secure and Effective Anonymous User Authentication Scheme for Roaming

Service in Global Mobility Networks. Wireless Personal Communications 73, 993-1004 (2013)

463. Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.-C.: Design and evaluation of a shoulder-surfing resistant graphical

password scheme. Proceedings of the working conference on Advanced visual interfaces. ACM, Venezia, Italy

(2006)

464. Winkler, C., Gugenheimer, J., Luca, A.D., Haas, G., Speidel, P., Dobbelstein, D., Rukzio, E.: Glass Unlock:

Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display. Proceedings of the

33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015)

465. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In:

IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), pp. 8 pp.

IEEE, (2006)

466. Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor

networks based on Internet of Things security. Journal of Ambient Intelligence and Humanized Computing 1-16

(2016)

467. Wu, F., Xu, L.: Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical

Information Systems. Journal of Medical Systems 37, 1-9 (2013)

468. Wu, J.S., Lin, W.C., Lin, C.T., Wei, T.E.: Smartphone continuous authentication based on keystroke and gesture

profiling. In: Security Technology (ICCST), 2015 International Carnahan Conference on, pp. 191-197. (2015)

469. Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS workshop on usable

privacy and security software. (2004)

470. Wu, S., Pu, Q., Kang, F.: Practical authentication scheme for SIP. Peer-to-Peer Networking and Applications 6, 61-

74 (2013)

471. Wu, S., Zhu, Y., Pu, Q.: Robust smart‐cards‐based user authentication scheme with user anonymity. Security and

Communication Networks 5, 236-248 (2012)

472. Wu, S.-T., Chieu, B.-C.: A user friendly remote authentication scheme with smart cards. Computers & Security 22,

547-550 (2003)

473. Wu, T.-S., Lee, M.-L., Lin, H.-Y., Wang, C.-Y.: Shoulder-surfing-proof graphical password authentication scheme.

International Journal of Information Security 13, 245-254 (2014)

474. Wu, Z.-Y., Chen, L., Wu, J.-C.: A Reliable RFID Mutual Authentication Scheme for Healthcare Environments.

Journal of Medical Systems 37, 1-9 (2013)

475. Xi, K., Hu, J., Han, F.: Mobile device access control: An improved correlation based face authentication scheme and

its Java ME application. Concurrency Computation Practice and Experience 24, 1066-1085 (2012)

476. Xiaojun, C., Zicheng, W., Yiguo, P., Jinqiao, S.: A Continuous Re-Authentication Approach Using Ensemble

Learning. Procedia Computer Science 17, 870-878 (2013)

477. Xiong, J., Xiong, J., Claramunt, C.: A spatial entropy-based approach to improve mobile risk-based authentication.

Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection

and Analysis. ACM, Dallas/Fort Worth, Texas (2014)

478. Xu, F., Han, S., Wang, Y., Zhang, J., Li, Y.: QRToken: Unifying Authentication Framework to Protect User Online

Identity. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, pp. 368-

373. (2015)

479. Yakovlev, V.A., Arkhipov, V.V.: User authentication based on the chess graphical password scheme resistant to

shoulder surfing. Automatic Control and Computer Sciences 49, 803-812 (2015)

480. Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Designing leakage-resilient password entry on touchscreen mobile

devices. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security.

ACM, Hangzhou, China (2013)

481. Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Leakage-resilient password entry: Challenges, design, and evaluation.

Computers & Security 48, 196-211 (2015)

482. Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P.: A Secure Biometrics-based Authentication Scheme for Telecare

Medicine Information Systems. Journal of Medical Systems 37, 1-6 (2013)

483. Yang, S., Schaumont, P., Verbauwhede, I.: Microcoded coprocessor for embedded secure biometric authentication

systems. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and

system synthesis. ACM, Jersey City, NJ, USA (2005)

484. Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In:

Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.

v/609-v/612 Vol. 605. IEEE, (2005)

485. Yang, T.-C., Lo, N.-W., Liaw, H.-T., Wu, W.C.: A secure smart card authentication and authorization framework

using in multimedia cloud. Multimedia Tools and Applications 1-23 (2016)

486. Yang, W., Ma, G., Zhou, F., Liao, Q.: Feature-level fusion of finger veins and finger dorsal texture for personal

authentication based on orientation selection. IEICE Transactions on Information and Systems E96-D, 1371-1373

(2014)

487. Yang, W., Yu, X., Liao, Q.: Personal authentication using finger vein pattern and finger-dorsa texture fusion. In:

MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums, pp.

905-908. (2009)

488. Yang, X., Han, F.: Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications. Proceedings of

the 12th International Conference on Advances in Mobile Computing and Multimedia. ACM, Kaohsiung, Taiwan

(2014)

489. Yao, L., Kong, X., Wu, G., Fan, Q., Lin, C.: A privacy-preserving authentication scheme using biometrics for

pervasive computing environments. Journal of Electronics (China) 27, 68-78 (2010)

490. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W., Zou, D.: Cloud authentication based on anonymous one-time

password. Ubiquitous Information Technologies and Applications, pp. 423-431. Springer (2013)

491. Yeh, K.-H.: A lightweight authentication scheme with user untraceability. Frontiers of Information Technology &

Electronic Engineering 16, 259-271 (2015)

492. Yeh, T.-C., Wu, C.-H., Tseng, Y.-M.: Improvement of the RFID authentication scheme based on quadratic residues.

Computer Communications 34, 337-341 (2011)

493. Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Person authentication from neural activity of face-specific visual self-

representation. Pattern Recognition 46, 1159-1169 (2013)

494. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.

Computers and Security 24, 50-56 (2005)

495. Yoon, E.-J., Yoo, K.-Y., Ha, K.-S.: A user friendly authentication scheme with anonymity for wireless

communications. Computers & Electrical Engineering 37, 356-364 (2011)

496. Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile

devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture

Notes in Bioinformatics), vol. 4537 LNCS, pp. 612-623 (2007)

497. Yoon, E.-J., Yoo, K.-Y.: More efficient and secure remote user authentication scheme using smart cards. In: 11th

International Conference on Parallel and Distributed Systems (ICPADS'05), pp. 73-77. IEEE, (2005)

498. Yu, Z., Liu, B.W., Shen, G.C.: Application of the hybrid arbitrated digital signature scheme in CSCW. In: 7th

International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2011. (2011)

499. Zack, R.S., Tappert, C.C., Cha, S.-H.: Performance of a long-text-input keystroke biometric authentication system

using an improved k-nearest-neighbor classification method. In: Fourth IEEE International Conference on

Biometrics: Theory Applications and Systems (BTAS), 2010, pp. 1-6. IEEE, (2010)

500. Zezschwitz, E.v., Koslow, A., Luca, A.D., Hussmann, H.: Making graphic-based authentication secure against

smudge attacks. Proceedings of the 2013 international conference on Intelligent user interfaces. ACM, Santa Monica,

California, USA (2013)

501. Zezschwitz, E.v., Luca, A.D., Brunkow, B., Hussmann, H.: SwiPIN: Fast and Secure PIN-Entry on Smartphones.

Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic

of Korea (2015)

502. Zhan, J., Fang, X.: Authentication using multi-level social networks. In: International Joint Conference on

Knowledge Discovery, Knowledge Engineering, and Knowledge Management, pp. 35-49. Springer, (2009)

503. Zhang, H., Li, M.: Security vulnerabilities of an remote password authentication scheme with smart card. In: 2011

International Conference on Consumer Electronics, Communications and Networks, CECNet 2011 - Proceedings, pp.

698-701. (2011)

504. Zhang, L., Razdan, A., Farin, G., Femiani, J., Bae, M., Lockwood, C.: 3D face authentication and recognition based

on bilateral symmetry analysis. The Visual Computer 22, 43-55 (2006)

505. Zhang, L., Tang, S., Zhu, S.: A lightweight privacy preserving authenticated key agreement protocol for SIP-based

VoIP. Peer-to-Peer Networking and Applications 9, 108-126 (2016)

506. Zhang, L., Tang, S., Zhu, S.: Privacy-preserving authenticated key agreement scheme based on biometrics for session

initiation protocol. Wireless Networks 1-16 (2016)

507. Zhang, Y., Sun, D., Qiu, Z.: A novel method for fusion operators evaluating at score-level fusion in biometric

authentication. In: International Conference on Signal Processing Proceedings, ICSP, pp. 1339-1342. (2010)

508. Zhao, G., Li, Y., Du, L., Zhao, X.: Asynchronous Challenge-Response Authentication Solution Based on Smart Card

in Cloud Environment. In: 2nd International Conference on Information Science and Control Engineering (ICISCE),

2015, pp. 156-159. (2015)

509. Zhao, H., Li, X.: S3PAS:A Scalable shoulder-surfing resistant textual-graphical password authentication scheme. In:

Proceedings - 21st International Conference on Advanced Information Networking and Applications

Workshops/Symposia, AINAW'07, pp. 467-472. (2007)

510. Zhao, Z., Ahn, G.J., Hu, H.: Picture gesture authentication: Empirical analysis, automated attacks, and scheme

evaluation. ACM Transactions on Information and System Security 17, (2015)

511. Zheng, P., Sang, N.: Using phase and directional line features for efficient palmprint authentication. In: Proceedings

of the 2009 2nd International Congress on Image and Signal Processing, CISP'09. (2009)

512. Zheng, P.: Gaussian Shape Descriptor for Palmprint Authentication. Cognitive Computation 2, 303-311 (2010)

513. Zheng, Z., Liu, X., Yin, L., Liu, Z.: A stroke-based textual password authentication scheme. In: Proceedings of the

1st International Workshop on Education Technology and Computer Science, ETCS 2009, pp. 90-95. (2009)

514. Zhou, Y., Cao, Z., Lu, R.: An efficient digital signature using self-certified public keys. Proceedings of the 3rd

international conference on Information security. ACM, Shanghai, China (2004)

515. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on

Consumer Electronics 50, 231-235 (2004)

Acceptance Topic 2 (AT2): Multi-Factor Authentication Methods

1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: A Novel Strong Password Generator for Improving Cloud

Authentication. Procedia Computer Science 85, 293-300 (2016)

2. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: An efficient framework for enhancing user authentication in cloud

storage using digital watermark. International Review on Computers and Software 10, 130-136 (2015)

3. Abdurrahman, U.A., Kaiiali, M., Muhammad, J.: A new mobile-based multi-factor authentication scheme using pre-

shared number, GPS location and time stamp. In: 2013 International Conference on Electronics, Computer and

Computation, ICECCO 2013, pp. 293-296. (2013)

4. Acharya, S., Polawar, A., Pawar, P.: Two factor authentication using smartphone generated one time password. IOSR

Journal of Computer Engineering (IOSR-JCE) 11, 85-90 (2013)

5. Adida, B.: Beamauth: Two-factor web authentication with a bookmark. In: Proceedings of the ACM Conference on

Computer and Communications Security, pp. 48-57. (2007)

6. Ahmed, M.N., Hussain, M.: Privacy Preserving Web Based Transaction Using E-Smart Cards and Image

Authentication. In: Proceedings - 2015 2nd IEEE International Conference on Advances in Computing and

Communication Engineering, ICACCE 2015, pp. 465-470. (2015)

7. Akram, S., Misbahuddin, M., Varaprasad, G.: A usable and secure two-factor authentication scheme. Information

Security Journal 21, 169-182 (2012)

8. Al-Assam, H., Jassim, S.: Robust Biometric Based Key Agreement and Remote Mutual Authentication. In: 2012

IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 59-65.

(2012)

9. Al-Assam, H., Jassim, S.A.: Multi-factor challenge/response approach for remote biometric authentication. In:

Proceedings of SPIE - The International Society for Optical Engineering. (2011)

10. Ali, A., Büchner, M., Segura, E.: Two factor authentication without the overhead of traditional OTP. In: Proceedings

of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009, pp. 141-147.

(2009)

11. Almazyad, A.S., Ahmad, Y.: A new approach in T-FA authentication with OTP using mobile phone.

Communications in Computer and Information Science, vol. 58, pp. 9-17 (2009)

12. Alnajjar, A., Janicke, H.: Multi-factor authentication using hardware information and user profiling techniques. In:

Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, HAISA

2012, pp. 160-173. (2012)

13. Aloul, F., Zahidi, S., El-Hajj, W.: Multi factor authentication using mobile phones. International Journal of

Mathematics and Computer Science 4, 65-80 (2009)

14. Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE/ACS International

Conference on Computer Systems and Applications, AICCSA 2009, pp. 641-644. (2009)

15. Alpar, O.: Intelligent biometric pattern password authentication systems for touchscreens. Expert Systems with

Applications 42, 6286-6294 (2015)

16. Alqattan, A., Kaviani, N., Lewis, P., Pearson, N.: A two-factor authentication system using mobile devices to protect

against untrusted public computers. University of British Columbia, Canada 329, (2007)

17. Amin, R., Biswas, G.P.: A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With

User Anonymity. Journal of Medical Systems 39, (2015)

18. Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer USB

mass storage device. In: Proceedings of the 2015 3rd International Conference on Computer, Communication,

Control and Information Technology, C3IT 2015. (2015)

19. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Obaidat, M.S.: Design and Analysis of an Enhanced Patient-Server

Mutual Authentication Protocol for Telecare Medical Information System. Journal of Medical Systems 39, 1-20

(2015)

20. Amin, R., Islam, S.H., Biswas, P.G., Khan, M.K., Li, X.: Cryptanalysis and Enhancement of Anonymity Preserving

Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. Journal of

Medical Systems 39, 1-21 (2015)

21. Amin, R., Islam, S.K.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three-

factor authenticated key exchange protocol for wireless sensor networks. Computer Networks 101, 42-62 (2016)

22. Anzaku, E.T., Sohn, H., Ro, Y.M.: Multi-factor authentication using fingerprints and user-specific random

projection. In: Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web

Conference, APWeb 2010, pp. 415-418. (2010)

23. Ariffin, N.A.M., Sani, N.F.M.: Plan recognition scheme using multi-factors authentication for smart card online

system. In: Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014,

pp. 156-160. (2014)

24. Arshad, H., Nikooghadam, M.: Security analysis and improvement of two authentication and key agreement schemes

for session initiation protocol. Journal of Supercomputing 71, 3163-3180 (2015)

25. Arshad, H., Nikooghadam, M.: Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare

Medicine Information Systems. Journal of Medical Systems 38, (2014)

26. Arshad, H., Teymoori, V., Nikooghadam, M., Abbassi, H.: On the Security of a Two-Factor Authentication and Key

Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 39, 1-10 (2015)

27. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A perfect dynamic-id and biometric based remote user authentication

scheme under multi-server environments using smart cards. Proceedings of the 8th International Conference on

Security of Information and Networks. ACM, Sochi, Russia (2015)

28. Banerjee, S., Dutta, M.P., Bhunia, C.T.: Cryptanalysis and Security Enhancement of an Efficient and Secure

Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments. Proceedings of the 2015

International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET

2015). ACM, Unnao, India (2015)

29. Bashir, M., Kempf, J.: Person authentication with RDTW based on handwritten PIN and signature with a novel

biometric smart pen device. In: Computational Intelligence in Biometrics: Theory, Algorithms, and Applications,

2009. CIB 2009. IEEE Workshop on, pp. 63-68. IEEE, (2009)

30. Battaglia, F., Iannizzotto, G., Lo Bello, L.: A biometric authentication system based on face recognition and rfid tags.

Mondo Digitale 13, (2014)

31. Benhammadi, F., Beghdad Bey, K.: Password hardened fuzzy vault for fingerprint authentication system. Image and

Vision Computing 32, 487-496 (2014)

32. Beton, M., Marie, V., Rosenberger, C.: Biometric secret path for mobile user authentication: A preliminary study. In:

Computer and Information Technology (WCCIT), 2013 World Congress on, pp. 1-6. (2013)

33. Bhargav-Spantzel, A., Squicciarini, A., Bertino, E.: Privacy preserving multi-factor authentication with biometrics.

In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the

13th ACM Conference on Computer and Communications Security, CCS'06, pp. 63-72. (2006)

34. Bhattasali, T., Saeed, K.: Two factor remote authentication in healthcare. In: Proceedings of the 2014 International

Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pp. 380-386. (2014)

35. Bhutta, F.K., Ghafoor, A., Sultan, S.: Smart phone based authentication and authorization protocol for SPACS. In:

2012 9th International Conference on High Capacity Optical Networks and Enabling Technologies, HONET 2012,

pp. 127-131. (2012)

36. Bindu, C.S., Reddy, P.C.S., Satyanarayana, B.: Improved remote user authentication scheme preserving user

anonymity. International Journal of Computer Science and Network Security 8, 62-66 (2008)

37. Binu, S., Misbahuddin, M., Raj, P.: A Mobile Based Remote User Authentication Scheme without Verifier Table for

Cloud Based Services. Proceedings of the Third International Symposium on Women in Computing and Informatics.

ACM, Kochi, India (2015)

38. Binu, S., Mohan, A., Deepak, K.T., Manohar, S., Misbahuddin, M., Raj, P.: A proof of concept implementation of a

mobile based authentication scheme without password table for cloud environment. In: Souvenir of the 2015 IEEE

International Advance Computing Conference, IACC 2015, pp. 1224-1229. (2015)

39. Boyd, D.J.: Single sign-on to the web with an EMV card. In: 2008 International Symposium on Collaborative

Technologies and Systems, CTS'08, pp. 112-120. (2008)

40. Braeken, A.: Efficient anonym smart card based authentication scheme for multi-server architecture. International

Journal of Smart Home 9, 177-184 (2015)

41. Brasee, K., Kami Makki, S., Zeadally, S.: A secure two-factor authentication scheme for single sign-on services.

Security and Communication Networks 2, 315-323 (2009)

42. Brasee, K., Makki, S.K., Zeadally, S.: A Novel Distributed Authentication Framework for Single Sign-On Services.

In: International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE,

pp. 52-58. (2008)

43. Briggs, P., Olivier, P.L.: Biometric daemons: authentication via electronic pets. CHI '08 Extended Abstracts on

Human Factors in Computing Systems. ACM, Florence, Italy (2008)

44. Bringer, J., Chabanne, H., Pointcheval, D., Zimmer, S.: An application of the Boneh and Shacham group signature

scheme to biometric authentication. Lecture Notes in Computer Science (including subseries Lecture Notes in

Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5312 LNCS, pp. 219-230 (2008)

45. Brömme, A., Al-Zubi, S.: Multifactor Biometric Sketch Authentication. In: BIOSIG, pp. 81-90. (2003)

46. Cao, L., Ge, W.: Analysis and improvement of a multi-factor biometric authentication scheme. Security and

Communication Networks 8, 617-625 (2015)

47. Cao, T., Huang, S.: Two-factor authentication schemes based smart card and password with user anonymity. Journal

of Computational Information Systems 9, 8831-8838 (2013)

48. Cao, T., Zhai, J.: Improved dynamic ID-based authentication scheme for telecare medical information systems.

Journal of Medical Systems 37, (2013)

49. Carullo, G., Ferrucci, F., Sarro, F.: Towards improving usability of authentication systems using smartphones for

logical and physical resource access in a single sign-on environment. Information Systems: Crossroads for

Organization, Management, Accounting and Engineering: ItAIS: The Italian Association for Information Systems,

pp. 145-153 (2013)

50. Chandrakar, P., Om, H.: RSA Based Two-factor Remote User Authentication Scheme with User Anonymity. In:

Procedia Computer Science, pp. 318-324. (2015)

51. Chang, C.-C., Hwang, S.-J.: Using smart cards to authenticate remote passwords. Computers & Mathematics with

Applications 26, 19-27 (1993)

52. Chang, C.-C., Lee, J.-S.: An efficient and secure multi-server password authentication scheme using smart cards. In:

International Conference on Cyberworlds, 2004, pp. 417-422. IEEE, (2004)

53. Chang, C.-C., Liao, W.-Y.: A remote password authentication scheme based upon ElGamal's signature scheme.

Computers & Security 13, 137-144 (1994)

54. Chang, C.-C., Nguyen, N.-T.: An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol

with Revocation. Wireless Personal Communications 1-21 (2016)

55. Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEE Proceedings E-Computers and

Digital Techniques 138, 165-168 (1991)

56. Chang, Y.F., Tai, W.L., Chang, H.C.: Untraceable dynamic‐identity‐based remote user authentication scheme with

verifiable password update. International Journal of Communication Systems 27, 3430-3440 (2014)

57. Chang, Y.F., Tai, W.L., Lin, S.C., Kwamg, T.S.: A two-factor and reader-undedicated authentication scheme with

passive RFID tags in WLAN. In: Proceedings - 2013 International Conference on Signal-Image Technology and

Internet-Based Systems, SITIS 2013, pp. 279-284. (2013)

58. Chang, Y.-F., Yu, S.-H., Shiao, D.-R.: A Uniqueness-and-Anonymity-Preserving Remote User Authentication

Scheme for Connected Health Care. Journal of Medical Systems 37, 1-9 (2013)

59. Chao, J.: An improved remote password authentication scheme with smart card. Journal of Electronics (China) 29,

550-555 (2012)

60. Chaturvedi, A., Mishra, D., Mukhopadhyay, S.: Improved biometric-based three-factor remote user authentication

scheme with key agreement using smart card. Lecture Notes in Computer Science (including subseries Lecture Notes

in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8303 LNCS, pp. 63-77 (2013)

61. Chaudhari, S., Tomar, S., Rawat, A.: Design, implementation and analysis of multi layer, Multi Factor

Authentication (MFA) setup for webmail access in multi trust networks. In: International Conference on Emerging

Trends in Networks and Computer Communications (ETNCC), 2011, pp. 27-32. IEEE, (2011)

62. Chaudhry, S.A., Farash, M.S., Naqvi, H., Kumari, S., Khan, M.K.: An enhanced privacy preserving remote user

authentication scheme with provable security. Security and Communication Networks 8, 3782-3795 (2015)

63. Chaudhry, S.A., Naqvi, H., Farash, M.S., Shon, T., Sher, M.: An improved and robust biometrics-based three factor

authentication scheme for multiserver environments. Journal of Supercomputing 1-17 (2015)

64. Chaudhry, S.A., Naqvi, H., Shon, T., Sher, M., Farash, M.S.: Cryptanalysis and Improvement of an Improved Two

Factor Authentication Protocol for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-11

(2015)

65. Chaurasia, B.K., Shahi, A., Verma, S.: Authentication in cloud computing environment using two factor

authentication. Advances in Intelligent Systems and Computing, vol. 259, pp. 779-785 (2014)

66. Cheikrouhou, O., Boujelben, M., Koubaa, A., Abid, M.: Attacks and improvement of "security enhancement for a

dynamic ID-based remote user authentication scheme". In: 2009 IEEE/ACS International Conference on Computer

Systems and Applications, AICCSA 2009, pp. 517-522. (2009)

67. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart‐card‐based remote user password authentication scheme.

International Journal of Communication Systems 27, 377-389 (2014)

68. Chen, C.L., Lee, C.C., Hsu, C.Y.: Mobile device integration of a fingerprint biometric remote authentication scheme.

International Journal of Communication Systems 25, 585-597 (2012)

69. Chen, C.T., Lee, C.C.: A two-factor authentication scheme with anonymity for multi-server environments. Security

and Communication Networks 8, 1608-1625 (2015)

70. Chen, H.-M., Lo, J.-W., Yeh, C.-K.: An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare

Medical Information Systems. Journal of Medical Systems 36, 3907-3915 (2012)

71. Chen, L., Wei, F., Ma, C.: A secure user authentication scheme against smart-card loss attack for wireless sensor

networks using symmetric key techniques. International Journal of Distributed Sensor Networks 2015, (2015)

72. Chen, T.-H., Hsiang, H.-C., Shih, W.-K.: Security enhancement on an improvement on two remote user

authentication schemes using smart cards. Future Generation Computer Systems 27, 377-380 (2011)

73. Chen, Y., Sun, J., Zhang, R., Zhang, Y.: Your song your way: Rhythm-based two-factor authentication for multi-

touch mobile devices. In: Proceedings - IEEE INFOCOM, pp. 2686-2694. (2015)

74. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A modified remote login authentication scheme based on geometric approach.

Journal of Systems and Software 55, 287-290 (2001)

75. Chong, L.G., Kiong, L.C., Letchumanan, C.: Two-factor face authentication: Topographic Independent Component

Analysis (TICA) and Multispace Random Projection (MRP). In: SoCPaR 2009 - Soft Computing and Pattern

Recognition, pp. 756-761. (2009)

76. Chuang, M.-C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust

computing using smart cards and biometrics. Expert Systems with Applications 41, 1411-1418 (2014)

77. Chudá, D., Ďurfina, M.: Multifactor authentication based on keystroke dynamics. In: ACM International Conference

Proceeding Series, pp. V.21-V.26. (2009)

78. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. Proceedings of the 2003

ACM SIGMM workshop on Biometrics methods and applications. ACM, Berkley, California (2003)

79. Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: A novel approach for dual-factor authentication. Pattern

Analysis and Applications 7, 255-268 (2004)

80. Czajka, A., Strzelczyk, P., Chochowski, M., Pacut, A.: Iris recognition with match-on-card. In: Signal Processing

Conference, 2007 15th European, pp. 189-192. (2007)

81. Czeskis, A., Dietz, M., Kohno, T., Wallach, D., Balfanz, D.: Strengthening user authentication through opportunistic

cryptographic identity assertions. In: Proceedings of the ACM Conference on Computer and Communications

Security, pp. 404-414. (2012)

82. Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards.

Journal of King Saud University - Computer and Information Sciences 27, 193-210 (2015)

83. Das, A.K., Goswami, A.: A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User

Authentication Scheme for Connected Health Care. Journal of Medical Systems 37, 1-16 (2013)

84. Das, A.K., Goswami, A.: An Enhanced Biometric Authentication Scheme for Telecare Medicine Information

Systems with Nonce Using Chaotic Hash Function. Journal of Medical Systems 38, 1-19 (2014)

85. Das, A.K.: A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale

Distributed Wireless Sensor Networks. Wireless Personal Communications 82, 1377-1404 (2015)

86. Das, A.K.: A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the

Integrated EPR Information System. Journal of Medical Systems 39, 1-14 (2015)

87. Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor

networks. Peer-to-Peer Networking and Applications 9, 223-244 (2016)

88. Das, A.K.: A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare

Medicine Information Systems. Journal of Medical Systems 39, (2015)

89. Das, A.K.: An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless

sensor networks. International Journal of Communication Networks and Distributed Systems 15, 22-60 (2015)

90. Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart

cards. IET Information Security 5, 145-151 (2011)

91. Das, M.L., Narasimhan, V.L.: EARS: Efficient Entity Authentication in Remote Systems. In: Proceedings -

International Conference on Information Technology: New Generations, ITNG 2008, pp. 603-608. (2008)

92. Das, M.L., Narasimhan, V.L.: Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic

Logic. In: Fifth International Conference on Information Technology: New Generations, 2008. ITNG 2008., pp. 545-

550. (2008)

93. Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote user authentication scheme using bilinear pairings.

Computers & Security 25, 184-189 (2006)

94. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE transactions on

Consumer Electronics 50, 629-631 (2004)

95. Das, M.L.: Secure and Efficient Authentication Scheme for Remote Systems. In: International Conference on

Information Technology, 2008. ICIT '08., pp. 226-231. (2008)

96. de Souza, R.L., Lung, L.C., Custódio, R.F.: Multi-factor Authentication in Key Management Systems. In: 2013 12th

IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 746-752.

IEEE, (2013)

97. Derawi, M.O., McCallum, S., Witte, H., Bours, P.: Biometric access control using Near Field Communication and

smart phones. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 490-497. (2012)

98. Dharavath, K., Talukdar, F.A., Laskar, R.H.: Facial image processing in conjunction with password for intelligent

access control. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. (2016)

99. Di Pietro, R., Me, G., Strangio, M.A.: A two-factor mobile authentication scheme for secure financial transactions.

In: 4th Annual International Conference on Mobile Business, ICMB 2005, pp. 28-34. (2005)

100. Diaconu, A.V.: Passcode based authentication protocol: Part I — Solution evaluation and software design. In:

Electrical and Electronics Engineering (ISEEE), 2010 3rd International Symposium on, pp. 204-210. (2010)

101. Diaz-Tellez, Y.H., Bodanese, E.L., Dimitrakos, T., Turner, M.: Context-Aware Multifactor Authentication Based on

Dynamic Pin. In: IFIP International Information Security Conference, pp. 330-338. Springer, (2014)

102. Eldefrawy, M.H., Alghathbar, K., Khan, M.K.: OTP-based two-factor authentication using mobile phones. In:

Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pp.

327-331. (2011)

103. Eldefrawy, M.H., Khan, M.K., Alghathbar, K., Kim, T.H., Elkamchouchi, H.: Mobile one-time passwords: Two-

factor authentication using mobile phones. Security and Communication Networks 5, 508-516 (2012)

104. Eldefrawy, M.H., Khan, M.K., Elkamchouchi, H.: The Use of Two Authentication Factors to Enhance the Security of

Mass Storage Devices. In: 11th International Conference on Information Technology: New Generations (ITNG),

2014, pp. 196-200. (2014)

105. Eminaʇaoʇlu, M., Çini, E., Sert, G., Zor, D.: A two-factor authentication system with QR codes for web and mobile

applications. In: Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014, pp.

105-112. (2014)

106. Esiner, E., Datta, A.: Layered security for storage at the edge: on decentralized multi-factor access control.

Proceedings of the 17th International Conference on Distributed Computing and Networking. ACM, Singapore,

Singapore (2016)

107. Fan, C.-I., Lin, Y.-H., Hsu, R.-H.: NIS03-6: Remote Password Authentication Scheme with Smart Cards and

Biometrics. In: IEEE Globecom 2006, pp. 1-5. IEEE, (2006)

108. Fan, C.I., Lin, Y.H.: Provably secure remote truly three-factor authentication scheme with privacy protection on

biometrics. IEEE Transactions on Information Forensics and Security 4, 933-945 (2009)

109. Fan, L., Li, J.-H., Zhu, H.-W.: An enhancement of timestamp-based password authentication scheme. Computers &

Security 21, 665-667 (2002)

110. Fathi, R., Salehi, M.A., Leiss, E.L.: User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud

Services. In: 2015 IEEE 8th International Conference on Cloud Computing, pp. 516-523. (2015)

111. Fleischhacker, N., Manulis, M., Azodi, A.: A modular framework for multi-factor authentication and key exchange.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in

Bioinformatics), vol. 8893, pp. 190-214 (2014)

112. Fujii, H., Shigematsu, N., Kurokawa, H., Nakagawa, T.: Telelogin: A two-factor two-path authentication technique

using caller ID. NTT Technical Review 6, (2008)

113. Fujii, H., Tsuruoka, Y.: SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. In:

2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 283-287.

(2013)

114. Fujii, H., Tsuruoka, Y.: Three-factor user authentication method using biometrics challenge response. Lecture Notes

in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in

Bioinformatics), vol. 7859 LNCS, pp. 395-396 (2013)

115. Go, W., Lee, K., Kwak, J.: Construction of a secure two-factor user authentication system using fingerprint

information and password. Journal of Intelligent Manufacturing 25, 217-230 (2014)

116. Goriparthi, T., Lal Das, M., Saxena, A.: An improved bilinear pairing based remote user authentication scheme.

Computer Standards & Interfaces 31, 181-185 (2009)

117. Griffin, P.H.: Biometric Knowledge Extraction for Multi-factor Authentication and Key Exchange. In: Procedia

Computer Science, pp. 66-71. (2015)

118. Griffin, P.H.: Telebiometric authentication objects. In: Procedia Computer Science, pp. 393-400. (2014)

119. Guo, M.H., Liaw, H.T., Deng, D.J., Chao, H.C.: An RFID secure authentication mechanism in WLAN. Computer

Communications 34, 236-240 (2011)

120. Gyorffy, J.C., Tappenden, A.F., Miller, J.: Token-based graphical password authentication. International Journal of

Information Security 10, 321-336 (2011)

121. Haar, D.v.d.: CaNViS: A cardiac and neurological-based verification system that uses wearable sensors. In: Third

International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 2015, pp.

99-104. (2015)

122. Hafizul Islam, S.K., Biswas, G.P.: Dynamic ID-based remote user mutual authentication scheme with smartcard

using Elliptic Curve Cryptography. Journal of Electronics (China) 31, 473-488 (2014)

123. Hahn, C., Kwon, H., Kim, D., Hur, J.: Enhanced authentication for outsourced educational contents through provable

block possession. Multimedia Tools and Applications (2015)

124. Hao, Z., Yu, N.: A security enhanced remote password authentication scheme using smart card. In: Data, Privacy and

E-Commerce (ISDPE), 2010 Second International Symposium on, pp. 56-60. IEEE, (2010)

125. Harini, N., Padmanabhan, T.: 2CAuth: A new two factor authentication scheme using QR-code. International Journal

of Engineering and Technology 5, 1087-1094 (2013)

126. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java

SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture

Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010)

127. Hayashi, E., Das, S., Amini, S., Hong, J., Oakley, I.: CASA: context-aware scalable authentication. Proceedings of

the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United Kingdom (2013)

128. He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user Authentication Scheme in Wireless Sensor

Networks. Ad-Hoc and Sensor Wireless Networks 10, 361-371 (2010)

129. He, D., Kumar, N., Khan, M.K., Lee, J.h.: Anonymous two-factor authentication for consumer roaming service in

global mobility networks. IEEE Transactions on Consumer Electronics 59, 811-817 (2013)

130. He, D., Kumar, N., Lee, J.H., Sherratt, R.S.: Enhanced three-factor security protocol for consumer USB mass storage

devices. IEEE Transactions on Consumer Electronics 60, 30-37 (2014)

131. He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless

communications. Computer Communications 34, 367-374 (2011)

132. He, W., Peng, X., Meng, X., Liu, X.: Two-factor authentication system based on optical interference and one-way

Hash function. In: Proceedings of SPIE - The International Society for Optical Engineering. (2012)

133. Holz, C., Bentley, F.R.: On-Demand Biometrics: Fast Cross-Device Authentication. Proceedings of the 2016 CHI

Conference on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016)

134. Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for

multi-server environment. Computer Standards and Interfaces 31, 1118-1123 (2009)

135. Hsiang, H.-C., Shih, W.-K.: Weaknesses and improvements of the Yoon–Ryu–Yoo remote user authentication

scheme using smart cards. Computer Communications 32, 649-652 (2009)

136. Hsiao, T.-C., Liao, Y.-T., Huang, J.-Y., Chen, T.-S., Horng, G.-B.: An Authentication Scheme to Healthcare Security

under Wireless Sensor Networks. Journal of Medical Systems 36, 3649-3664 (2012)

137. Hsieh, W.B., Leu, J.S.: A robust user authentication scheme using dynamic identity in wireless sensor networks.

Wireless Personal Communications 77, 979-989 (2014)

138. Hsieh, W.-B., Leu, J.-S.: An anonymous mobile user authentication protocol using self-certified public keys based on

multi-server architectures. The Journal of Supercomputing 70, 133-148 (2014)

139. Hsieh, W.-B., Leu, J.-S.: Exploiting hash functions to intensify the remote user authentication scheme. Computers &

Security 31, 791-798 (2012)

140. Hu, J.Y., Sueng, C.C., Liao, W.H., Ho, C.C.: Android-based mobile payment service protected by 3-factor

authentication and virtual private ad hoc networking. In: Computing, Communications and Applications Conference

(ComComAp), 2012, pp. 111-116. (2012)

141. Huang, B., Khan, M.K., Wu, L., Muhaya, F.T.B., He, D.: An Efficient Remote User Authentication with Key

Agreement Scheme Using Elliptic Curve Cryptography. Wireless Personal Communications 85, 225-240 (2015)

142. Huang, H.F., Chang, Y.F., Liu, C.H.: Enhancement of two-factor user authentication in wireless sensor networks. In:

Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal

Processing, IIHMSP 2010, pp. 27-30. (2010)

143. Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication:

Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 22,

1390-1397 (2011)

144. Huseynov, E., Seigneur, J.M.: WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts. In:

Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, K-2015 - Academic Conference.

(2015)

145. Hwang, M.-S., Chong, S.-K., Chen, T.-Y.: DoS-resistant ID-based password authentication scheme using smart

cards. Journal of Systems and Software 83, 163-172 (2010)

146. Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: A simple remote user authentication scheme. Mathematical and Computer

Modelling 36, 103-107 (2002)

147. Hwang, M.-S., Li, L.-H., Lee, C.-C.: A key authentication scheme with non-repudiation. SIGOPS Oper. Syst. Rev.

38, 75-78 (2004)

148. Indu, S., Sathya, T.N., Saravana Kumar, V.: A stand-alone and SMS-based approach for authentication using mobile

phone. In: 2013 International Conference on Information Communication and Embedded Systems, ICICES 2013, pp.

140-145. (2013)

149. Islam, S.: Design and analysis of an improved smartcard‐based remote user password authentication scheme.

International Journal of Communication Systems (2014)

150. Islam, S.H., Khan, M.K.: Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for

Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-16 (2014)

151. Islam, S.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended

chaotic maps. Nonlinear Dynamics 78, 2261-2276 (2014)

152. Islam, S.K.H., Biswas, G.P.: Cryptanalysis and improvement of a password-based user authentication scheme for the

integrated EPR information system. Journal of King Saud University - Computer and Information Sciences 27, 211-

221 (2015)

153. Jayasudha, A.C.: Two factor authenticated cash withdrawal using mobile phones and apprehend insecure users within

the ATM centre. Contemporary Engineering Sciences 7, 449-455 (2014)

154. Jeong, Y.S., Park, J.S., Park, J.H.: An efficient authentication system of smart device using multi factors in mobile

cloud service architecture. International Journal of Communication Systems 28, 659-674 (2015)

155. Jiang, L., Li, X., Guo, D.: Mutual password authentication with key agreement and user anonymity for cloud storage.

Journal of Computers (Taiwan) 27, 12-25 (2016)

156. Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-Health

clouds. Journal of Supercomputing 1-24 (2016)

157. Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart‐card‐based password authentication scheme.

International Journal of Communication Systems 28, 383-393 (2015)

158. Jiang, Q., Ma, J., Li, G., Yang, L.: Robust two-factor authentication and key agreement preserving user privacy.

International Journal of Network Security 16, 229-240 (2014)

159. Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless

sensor networks. Peer-to-Peer Networking and Applications 8, 1070-1081 (2014)

160. Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong

anonymity for telecare medicine information systems. Journal of Medical Systems 38, (2014)

161. Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor

authentication scheme preserving biometric template privacy. Nonlinear Dynamics 83, 2085-2101 (2016)

162. Jiang, R., Pan, L., Li, J.-H.: Further analysis of password authentication schemes based on authentication tests.

Computers & Security 23, 469-477 (2004)

163. Jiang, W.q., Huang, Z.q., Yang, Y.x., Tian, J., Li, L.: ID-based authentication scheme combined with identity-based

encryption with fingerprint hashing. Journal of China Universities of Posts and Telecommunications 15, 75-"80,120"

(2008)

164. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two factor authentication featuring fingerprint data and tokenised

random number. Pattern Recognition 37, 2245-2255 (2004)

165. Johnson, B., Maillart, T., Chuang, J.: My thoughts are not your thoughts. In: UbiComp 2014 - Adjunct Proceedings

of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 1329-1338. (2014)

166. Juang, W.-S., Wu, J.-L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs.

Computers & Electrical Engineering 35, 33-40 (2009)

167. Juang, W.-S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on

Consumer Electronics 50, 251-255 (2004)

168. Jun, E.-A., Ji, J.D., Lim, J., Jung, S.W.: Improved remote user authentication scheme using bilinear pairings.

Proceedings of the 2009 International Conference on Hybrid Information Technology. ACM, Daejeon, Korea (2009)

169. Jung, J., Lee, D., Kim, J., Lee, Y., Kang, D., Won, D.: Cryptanalysis and Improvement of Efficient Password-Based

User Authentication Scheme using Hash Function. Proceedings of the 10th International Conference on Ubiquitous

Information Management and Communication. ACM, Danang, Viet Nam (2016)

170. Kalra, S., Sood, S.: Advanced remote user authentication protocol for multi-server architecture based on ECC.

Journal of Information Security and Applications 18, 98-107 (2013)

171. Kalra, S., Sood, S.K.: Advanced password based authentication scheme for wireless sensor networks. Journal of

Information Security and Applications 20, 37-46 (2015)

172. Kalsoom, S., Ziauddin, S.: Cryptanalysis and improvement of a two-factor user authentication scheme providing

mutual authentication and key agreement over insecure channels. International Journal of Machine Learning and

Computing 3, 400 (2013)

173. Kanade, S., Camara, D., Krichen, E., Petrovska-Delacrétaz, D., Dorizzi, B.: Three factor scheme for biometric-based

cryptographic key regeneration using iris. In: Biometrics Symposium, 2008. BSYM'08, pp. 59-64. IEEE, (2008)

174. Kang, J., Nyang, D., Lee, K.: Two factor face authentication scheme with cancelable feature. Lecture Notes in

Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),

vol. 3781 LNCS, pp. 67-76 (2005)

175. Kang, J., Nyang, D., Lee, K.: Two-factor face authentication using matrix permutation transformation and a user

password. Information Sciences 269, 1-20 (2014)

176. Karapanos, N., Marforio, C., Soriente, C., Capkun, S.: Sound-proof: Usable two-factor authentication based on

ambient sound. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 483-498. (2015)

177. Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. Journal of

Information Security and Applications 19, 282-294 (2014)

178. Kathrine, G.J.W., Kirubakaran, E.: Four-factor based privacy preserving biometric authentication and authorization

scheme for enhancing grid security. Int J Comput Appl 30, 13-20 (2011)

179. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless

sensor networks’. Sensors 10, 2450-2459 (2010)

180. Khan, M.K., Kim, S.-K., Alghathbar, K.: Cryptanalysis and security enhancement of a ‘more efficient & secure

dynamic ID-based remote user authentication scheme’. Computer Communications 34, 305-309 (2011)

181. Khan, M.K., Kumari, S., Gupta, M.K.: More efficient key-hash based fingerprint remote authentication scheme using

mobile device. Computing 96, 793-816 (2014)

182. Khan, M.K., Kumari, S.: An Authentication Scheme for Secure Access to Healthcare Services. Journal of Medical

Systems 37, 1-12 (2013)

183. Khan, M.K., Kumari, S.: Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID‐based

Authentication Scheme for Telecare Medical Information Systems”. Security and Communication Networks 7, 399-

408 (2014)

184. Khan, M.K., Zhang, J., Wang, X.: Chaotic hash-based fingerprint biometric remote user authentication scheme on

mobile devices. Chaos, Solitons & Fractals 35, 519-524 (2008)

185. Khan, M.K., Zhang, J.: Improving the security of ‘a flexible biometrics remote user authentication scheme’.

Computer Standards & Interfaces 29, 82-85 (2007)

186. Khan, M.K.: Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic

world. IETE Technical Review 26, 191-195 (2009)

187. Khan, S.H., Akbar, M.A.: Multi-Factor Authentication on Cloud. In: 2015 International Conference on Digital Image

Computing: Techniques and Applications, DICTA 2015. (2015)

188. Khan, S.H., Ali Akbar, M., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor

authentication. Pattern Recognition 48, 458-472 (2015)

189. Kim, A., Gyeonghyeon, P., Youjung, S., Lee, S.H.: A non-memorization bio-password scheme with confidence

interval sets. In: 2013 International Conference on ICT Convergence (ICTC), pp. 1102-1106. (2013)

190. Kim, A.Y., Lee, S.H.: Authentication Protocol using Fuzzy Eigenface Vault based on MoC. In: The 9th International

Conference on Advanced Communication Technology, pp. 1771-1775. (2007)

191. Kim, H.-S., Lee, S.-W., Yoo, K.-Y.: ID-based password authentication scheme using smart cards and fingerprints.

SIGOPS Oper. Syst. Rev. 37, 32-41 (2003)

192. Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual

authentication with key agreement in wireless sensor networks. Sensors 14, 6443-6462 (2014)

193. Kim, K.-W., Jeon, J.-C., Yoo, K.-Y.: Efficient and secure password authentication schemes for low-power devices.

International Journal of Sensor Networks 2, 77-81 (2007)

194. Kim, S.H., Choi, D., Jin, S.H., Lee, S.H.: Geo-location based QR-code authentication scheme to defeat active real-

time phishing attack. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 51-

61. (2013)

195. Kolhe, V., Gunjal, V., Kalasakar, S., Rathod, P.: Secure Authentication with 3D Password. International Journal Of

Engineering Science And Innovative Technology (IJESIT) (2013)

196. Ku, Y., Choi, O., Kim, K., Shon, T., Hong, M., Yeh, H., Kim, J.H.: Two-factor authentication system based on

extended OTP mechanism. International Journal of Computer Mathematics 90, 2515-2529 (2013)

197. Kumar, A.S., Girish, K.P.: A three factor authentication system for smartcard using biometric, Visual cryptography

and otp. Advances in Intelligent Systems and Computing, vol. 324, pp. 673-679 (2015)

198. Kumar, M., Gupta, M.K., Kumari, S.: An Improved Efficient Remote Password Authentication Scheme with Smart

Card over Insecure Networks. IJ Network Security 13, 167-177 (2011)

199. Kumar, P., Choudhury, A.J., Sain, M., Lee, S.-G., Lee, H.-J.: RUASN: a robust user authentication framework for

wireless sensor networks. Sensors 11, 5020-5046 (2011)

200. Kumar, P., Lee, S.G., Lee, H.J.: A user authentication for healthcare application using wireless medical sensor

networks. In: Proc.- 2011 IEEE International Conference on HPCC 2011 - 2011 IEEE International Workshop on

FTDCS 2011 -Workshops of the 2011 Int. Conf. on UIC 2011- Workshops of the 2011 Int. Conf. ATC 2011, pp.

647-652. (2011)

201. Kumar, P., Sain, M., Lee, H.J.: An efficient two-factor user authentication framework for wireless sensor networks.

In: 13th International Conference on Advanced Communication Technology (ICACT), 2011, pp. 574-578. (2011)

202. Kumari, S., Khan, M.K., Li, X.: A more secure digital rights management authentication scheme based on smart

card. Multimedia Tools and Applications 75, 1135-1158 (2016)

203. Kumari, S., Khan, M.K., Li, X.: An improved remote user authentication scheme with key agreement. Computers &

Electrical Engineering 40, 1997-2012 (2014)

204. Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password

authentication scheme'. International Journal of Communication Systems 27, 3939-3955 (2014)

205. Kumari, S., Khan, M.K.: More secure smart card‐based remote user password authentication scheme with user

anonymity. Security and Communication Networks 7, 2039-2053 (2014)

206. Kumari, S., Li, X., Wu, F., Das, A.K., Arshad, H., Khan, M.K.: A user friendly mutual authentication and key

agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems (2016)

207. Kumari, S., Wu, F., Li, X., Farash, M.S., Jiang, Q., Khan, M.K., Das, A.K.: Single round-trip SIP authentication

scheme with provable security for Voice over Internet Protocol using smart card. Multimedia Tools and Applications

1-31 (2015)

208. Lai, W.K., Tan, B.G., Soo, M.S., Khan, I.: Two-factor user authentication with the CogRAM weightless neural net.

In: 2014 International Joint Conference on Neural Networks (IJCNN), pp. 3751-3758. (2014)

209. Laptikultham, S., Tritilanunt, S.: Modeling and analysis of two-factor authentication protocol for USB digital

evidence acquisition devices. In: Proceedings of the 2015 12th International Joint Conference on Computer Science

and Software Engineering, JCSSE 2015, pp. 241-246. (2015)

210. Le, H.D., Chang, C.C., Chou, Y.C.: A novel untraceable authentication scheme for mobile roaming in GLOMONET.

International Journal of Network Security 17, 395-404 (2015)

211. Lee, C.C., Chen, C.T., Wu, P.H., Chen, T.Y.: Three-factor control protocol based on elliptic curve cryptosystem for

universal serial bus mass storage devices. IET Computers and Digital Techniques 7, 48-55 (2013)

212. Lee, C.-C., Hsu, C.-W.: A secure biometric-based remote user authentication with key agreement scheme using

extended chaotic maps. Nonlinear Dynamics 71, 201-211 (2013)

213. Lee, K.: A study on user access control method using multi-factor authentication for EDMS. International Journal of

Security and its Applications 7, 327-334 (2013)

214. Lee, S., Ong, I., Lim, H.-T., Lee, H.-J.: Two factor authentication for cloud computing. Journal of information and

communication convergence engineering 8, 427-432 (2010)

215. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Efficient nonce-based remote user authentication scheme using smart cards.

Applied Mathematics and Computation 167, 355-361 (2005)

216. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improvement of Chien et al.'s remote user authentication scheme using smart

cards. Computer Standards & Interfaces 27, 181-183 (2005)

217. Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C.: A Secure and Efficient Password-Based User Authentication

Scheme Using Smart Cards for the Integrated EPR Information System. Journal of Medical Systems 37, 1-7 (2013)

218. Lee, T.-F., Liu, C.-M.: A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare

Medicine Information Systems. Journal of Medical Systems 37, 1-8 (2013)

219. Lee, Y., Yang, H., Won, D.: Attacking and improving on Lee and Chiu's authentication scheme using smart cards.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in

Bioinformatics), vol. 6047 LNCS, pp. 377-385 (2010)

220. Lee, Y.-C., Hsieh, Y.-C., Lee, P.-J., You, P.-S.: Improvement of the ElGamal Based Remote Authentication Scheme

Using Smart Cards. Journal of Applied Research and Technology 12, 1063-1072 (2014)

221. Lee, Y.C.: Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme. Journal of Applied

Research and Technology 11, 597-603 (2013)

222. Li, C., Qi, J.: A two-factor authentication design of fingerprint recognition system based on DSP and RF card. In:

2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010, pp. 441-445.

(2010)

223. Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smart cards. Journal

of Network and Computer Applications 33, 1-5 (2010)

224. Li, C.-T., Lee, C.-C., Lee, C.-W.: An improved two-factor user authentication protocol for wireless sensor networks

using elliptic curve cryptography. Sensor Letters 11, 958-965 (2013)

225. Li, C.T., Lee, C.C., Wang, L.J., Liu, C.J.: A secure billing service with two-factor user authentication in wireless

sensor networks. International Journal of Innovative Computing, Information and Control 7, 4821-4831 (2011)

226. Li, C.-T., Lee, C.-C., Weng, C.-Y., Fan, C.-I.: An Extended Multi-Server-Based User Authentication and Key

Agreement Scheme with User Anonymity. KSII Transactions on Internet & Information Systems 7, (2013)

227. Li, C.-T., Lee, C.-C., Weng, C.-Y.: A Secure Chaotic Maps and Smart Cards Based Password Authentication and

Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. Journal of Medical

Systems 38, 1-11 (2014)

228. Li, C.-T., Lee, C.-C., Weng, C.-Y.: An extended chaotic maps based user authentication and privacy preserving

scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics 74, 1133-

1143 (2013)

229. Li, C.T., Weng, C.Y., Fan, C.I.: Two-factor user authentication in multi-server networks. International Journal of

Security and its Applications 6, 261-268 (2012)

230. Li, C.T., Weng, C.Y., Lee, C.C., Chin-Wen, L.: Towards secure and dynamic password based user authentication

scheme in hierarchical wireless sensor networks. International Journal of Security and its Applications 7, 249-258

(2013)

231. Li, C.-T., Weng, C.-Y., Lee, C.-C., Wang, C.-C.: A Hash Based Remote User Authentication and Authenticated Key

Agreement Scheme for the Integrated EPR Information System. Journal of Medical Systems 39, 1-11 (2015)

232. Li, C.-T., Weng, C.-Y., Lee, C.-C., Wang, C.-C.: Secure User Authentication and User Anonymity Scheme based on

Quadratic Residues for the Integrated EPRIS. Procedia Computer Science 52, 21-28 (2015)

233. Li, C.-T., Weng, C.-Y., Lee, C.-C.: An advanced temporal credential-based security scheme with mutual

authentication and key agreement for wireless sensor networks. Sensors 13, 9589-9603 (2013)

234. Li, C.T.: A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart

card. IET Information Security 7, 3-10 (2013)

235. Li, C.T.: Secure smart card based password authentication scheme with user anonymity. Information Technology and

Control 40, 157-162 (2011)

236. Li, F., Liu, Q., Pang, L., Pei, Q.: Identity Authentication Based on Fuzzy Vault and Digital Certificate. In:

International Conference on Computational Intelligence and Security (CIS), 2010, pp. 441-445. (2010)

237. Li, H., Hu, L., Yuan, W., Chu, J.: Attacking and improving of Das's authentication scheme in wireless sensor

networks. Journal of Convergence Information Technology 7, 396-403 (2012)

238. Li, T., Jin, Z.: A New Low Cost One Time ID and Password Authentication Protocol Using Popular Removable

Storage Devices. In: Second International Conference on Intelligent Networks and Intelligent Systems, 2009. ICINIS

'09., pp. 213-216. (2009)

239. Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication

scheme for multi-server environments. Mathematical and Computer Modelling 58, 85-95 (2013)

240. Li, X., Niu, J., Khan, M.K., Liao, J., Zhao, X.: Robust three‐factor remote user authentication scheme with key

agreement for multimedia systems. Security and Communication Networks (2014)

241. Li, X., Niu, J., Khan, M.K., Liao, J.: Robust Biometrics Based Three-Factor Remote User Authentication Scheme

with Key Agreement. In: Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, pp.

105-110. (2013)

242. Li, X., Niu, J., Khurram Khan, M., Liao, J.: An enhanced smart card based remote user password authentication

scheme. Journal of Network and Computer Applications 36, 1365-1371 (2013)

243. Li, X., Niu, J., Kumari, S., Islam, S.H., Wu, F., Khan, M.K., Das, A.K.: A Novel Chaotic Maps-Based User

Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wireless

Personal Communications 89, 569-597 (2016)

244. Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three-factor remote user authentication scheme

with key agreement. Security and Communication Networks 7, 1488-1497 (2014)

245. Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three‐factor remote user authentication scheme

with key agreement. Security and Communication Networks 7, 1488-1497 (2014)

246. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: A biometric-based password authentication with key exchange scheme

using mobile device for multi-server environment. Applied Mathematics and Information Sciences 9, 1123-1137

(2015)

247. Li, X., Wen, Q., Li, W.: A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic

Security and Personal Privacy for Wireless Communications. Wireless Personal Communications 86, 1593-1610

(2016)

248. Li, X., Zhang, Y.: A simple and robust anonymous two‐factor authenticated key exchange protocol. Security and

Communication Networks 6, 711-722 (2013)

249. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: Security enhancement for a dynamic ID-based remote user authentication

scheme. In: International Conference on Next Generation Web Services Practices (NWeSP'05), pp. 4 pp. IEEE,

(2009)

250. Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards.

Mathematical and Computer Modelling 44, 223-228 (2006)

251. Lin, C.-H., Lai, Y.-Y.: A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces

27, 19-23 (2004)

252. Lin, H.-Y.: On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information

Systems. Journal of Medical Systems 37, 1-5 (2013)

253. Lin, X., Huafei, Z., Ho, P.H., Shen, X.: Two-Factor Localized Authentication Scheme for WLAN Roaming. In: 2007

IEEE International Conference on Communications, pp. 1172-1178. (2007)

254. Lin, Y., Wang, K., Zhang, B., Liu, Y., Li, X.: An enhanced biometric-based three factors user authentication scheme

for multi-server environments. International Journal of Security and its Applications 10, 315-328 (2016)

255. Liou, J.C., Bhashyam, S.: A feasible and cost effective two-factor authentication for online transactions. In: 2nd

International Conference on Software Engineering and Data Mining, SEDM 2010, pp. 47-51. (2010)

256. Liou, J.-C., Bhashyam, S.: On Improving Feasibility and Security Measures of Online Authentication. Int. J. Adv.

Comp. Techn. 2, 6-16 (2010)

257. Liou, J.C., Egan, G., Patel, J.K., Bhashyam, S.: A sophisticated RFID application on multi-factor authentication. In:

Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pp.

180-185. (2011)

258. Liu, C.-H., Chung, Y.-F.: Secure user authentication scheme for wireless healthcare sensor networks. Computers &

Electrical Engineering (2016)

259. Liu, C.-L., Tsai, C.-J., Chang, T.-Y., Tsai, W.-J., Zhong, P.-K.: Implementing multiple biometric features for a recall-

based graphical keystroke dynamics authentication system on a smart phone. Journal of Network and Computer

Applications 53, 128-139 (2015)

260. Liu, F.: Efficient two-factor authentication protocol using password and smart card. Journal of Computers (Finland)

8, 3257-3263 (2013)

261. Liu, H., Zhang, Y.: An improved one-time password authentication scheme. In: International Conference on

Communication Technology Proceedings, ICCT, pp. 1-5. (2013)

262. Liu, J.K., Au, M.H., Huang, X., Lu, R., Li, J.: Fine-Grained Two-Factor Access Control for Web-Based Cloud

Computing Services. IEEE Transactions on Information Forensics and Security 11, 484-497 (2016)

263. Liu, W., Uluagac, A.S., Beyah, R.: MACA: A privacy-preserving multi-factor cloud authentication system utilizing

big data. In: Proceedings - IEEE INFOCOM, pp. 518-523. (2014)

264. Liu, W., Xie, Q., Wang, S., Hu, B.: An improved authenticated key agreement protocol for telecare medicine

information system. SpringerPlus 5, 1-16 (2016)

265. Liu, X., Cheung, Y.M.: Learning multi-boosted HMMs for lip-password based speaker verification. IEEE

Transactions on Information Forensics and Security 9, 233-246 (2014)

266. Liu, Y., Wei, F., Ma, C.: Multi-factor authenticated key exchange protocol in the three-party setting. Lecture Notes in

Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),

vol. 6584 LNCS, pp. 255-267 (2011)

267. Lu, Y., Li, L., Peng, H., Xie, D., Yang, Y.: Robust and Efficient Biometrics Based Password Authentication Scheme

for Telecare Medicine Information Systems Using Extended Chaotic Maps. Journal of Medical Systems 39, 1-10

(2015)

268. Lu, Y., Li, L., Peng, H., Yang, Y.: An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine

Information Systems Using Elliptic Curve Cryptosystem. Journal of Medical Systems 39, 1-8 (2015)

269. Lu, Y.F., Lin, P.H., Ye, S.S., Wang, R.S., Chou, S.C.: A strong authentication with key agreement scheme for web-

based collaborative systems. In: ISPACS 2012 - IEEE International Symposium on Intelligent Signal Processing and

Communications Systems, pp. 343-348. (2012)

270. Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it's you!: implicit

authentication based on touch screen patterns. Proceedings of the SIGCHI Conference on Human Factors in

Computing Systems. ACM, Austin, Texas, USA (2012)

271. Mali, P., Salunke, S., Mane, R., Khatavkar, P.: Multilevel ATM Security Based On Two Factor Biometrics. In:

International Journal of Engineering Research and Technology. ESRSA Publications, (2012)

272. Mann, C., Loebenberger, D.: Two-factor authentication for the Bitcoin protocol. International Journal of Information

Security 1-14 (2016)

273. Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted

computer. In: International Conference on Financial Cryptography and Data Security, pp. 88-103. Springer, (2007)

274. Mathew, H.M., Raj, S.B.E., Gundapu, P.S.J., Angeline, S.J.F.: An improved three-factor authentication scheme using

smart card with biometric privacy protection. In: ICECT 2011 - 2011 3rd International Conference on Electronics

Computer Technology, pp. 220-223. (2011)

275. Maxion, R.A., Killourhy, K.S.: Keystroke biometrics with number-pad input. In: Proceedings of the International

Conference on Dependable Systems and Networks, pp. 201-210. (2010)

276. Mir, O., van der Weide, T., Lee, C.-C.: A Secure User Anonymity and Authentication Scheme Using AVISPA for

Telecare Medical Information Systems. Journal of Medical Systems 39, 1-16 (2015)

277. Miranda, L.H.F.M.: Context-aware multi-factor authentication. Faculdade de Ciências e Tecnologia (2009)

278. Mirkovic, J., Bryhni, H., Ruland, C.M.: Secure solution for mobile access to patient's health care record. In: 13th

IEEE International Conference on e-Health Networking Applications and Services (Healthcom), 2011, pp. 296-303.

IEEE, (2011)

279. Misbahuddin, M., Premchand, P., Govardhan, A.: A user friendly password authenticated key agreement for multi

server environment. Proceedings of the International Conference on Advances in Computing, Communication and

Control. ACM, Mumbai, India (2009)

280. Mishra, D., Chaturvedi, A., Mukhopadhyay, S.: Design of a lightweight two-factor authentication scheme with smart

card revocation. Journal of Information Security and Applications 23, 44-53 (2016)

281. Mishra, D., Das, A.K., Chaturvedi, A., Mukhopadhyay, S.: A secure password-based authentication and key

agreement scheme using smart cards. Journal of Information Security and Applications 23, 28-43 (2015)

282. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving biometric-based multi-server

authenticated key agreement scheme using smart cards. Expert Systems with Applications 41, 8129-8143 (2014)

283. Mishra, D., Srinivas, J., Mukhopadhyay, S.: A Secure and Efficient Chaotic Map-Based Authenticated Key

Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-10 (2014)

284. Mohammed, M.M., Elsadig, M.: A multi-layer of multi factors authentication model for online banking services. In:

International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), 2013, pp. 220-224.

(2013)

285. Moon, J., Yu, J., Yang, H., Won, D.: Improvement of Biometrics and Smart Cards-based Authentication Scheme for

Multi-Server Environments. Proceedings of the 10th International Conference on Ubiquitous Information

Management and Communication. ACM, Danang, Viet Nam (2016)

286. Mtonga, K., Yoon, E.J., Kim, H.: A Pairing Based Authentication and Key Establishment Scheme for Remote Patient

Monitoring Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and

Telecommunications Engineering, LNICST, vol. 135 LNICST, pp. 79-89 (2014)

287. Mueller, R., Sanchez-Reillo, R.: An approach to biometric identity management using low-cost equipment. In: IIH-

MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,

pp. 1096-1100. (2009)

288. Munch-Ellingsen, A., Karlsen, R., Andersen, A., Akselsen, S.: Two-factor authentication for android host card

emulated contactless cards. In: 2015 1st Conference on Mobile and Secure Services, MOBISECSERV 2015. (2015)

289. Muniyandi, A.P., Ramasamy, R., Indrani: Password based remote authentication scheme using ECC for smart card.

Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, Rourkela,

Odisha, India (2011)

290. Nag, A.K., Dasgupta, D., Deb, K.: An adaptive approach for active multi-factor authentication. In: 9th Annual

Symposium on Information Assurance (ASIA’14), pp. 39. (2014)

291. Nag, A.K., Dasgupta, D.: An adaptive approach for continuous multi-factor authentication in an identity eco-system.

In: ACM International Conference Proceeding Series, pp. 65-68. (2014)

292. Nag, A.K., Roy, A., Dasgupta, D.: An Adaptive Approach Towards the Selection of Multi-Factor Authentication. In:

Computational Intelligence, 2015 IEEE Symposium Series on, pp. 463-472. IEEE, (2015)

293. Nagaraju, S., Parthiban, L.: SecAuthn: Provably secure multi-factor authentication for the cloud computing systems.

Indian Journal of Science and Technology 9, (2016)

294. Nam, J., Choo, K.-K.R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication

in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Plos one 10, e0116709

(2015)

295. Nanjing, C.: Advanced secure user authentication framework for cloud computing. (2013)

296. Narhar, U.K., Joshi, R.B.: Highly secure authentication scheme. In: Proceedings - 1st International Conference on

Computing, Communication, Control and Automation, ICCUBEA 2015, pp. 270-274. (2015)

297. Nematollahi, M.A., Gamboa-Rosales, H., Martinez-Ruiz, F.J., de la Rosa-Vargas, J.I., Al-Haddad, S.A.R.,

Esmaeilpour, M.: Multi-factor authentication model based on multipurpose speech watermarking and online speaker

recognition. Multimedia Tools and Applications 1-31 (2016)

298. Nguyen, N.T., Le, H.D., Chang, C.C.: Provably secure and efficient three-factor authenticated key agreement scheme

with untraceability. International Journal of Network Security 18, 335-344 (2016)

299. Ntantogian, C., Malliaros, S., Xenakis, C.: Gaithashing: A two-factor authentication scheme based on gait features.

Computers and Security 52, 17-32 (2015)

300. Odelu, V., Das, A.K., Goswami, A.: An efficient ECC-based privacy-preserving client authentication protocol with

key agreement using smart card. Journal of Information Security and Applications 21, 1-19 (2015)

301. Omar, M., Din, R., Tahir, H.: Smart cards and the fingerprint: A framework for user identification and authentication.

Journal of ICT (2003)

302. Pang, Y.-H., J., A.T.B., L, D.N.C.: Two-Factor Cancelable Biometrics Authenticator. Journal of Computer Science

and Technology 22, 54-59 (2007)

303. Panjwani, S., Cutrell, E.: Usably secure, low-cost authentication for mobile banking. Proceedings of the Sixth

Symposium on Usable Privacy and Security. ACM, Redmond, Washington, USA (2010)

304. Park, H., Redford, S.: Client certificate and IP address based multi-factor authentication for J2EE web applications.

In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, CASCON

'07, pp. 167-174. (2007)

305. Park, H.J.: Enhanced user authentication scheme for wireless sensor networks. International Journal of Security and

its Applications 9, 367-374 (2015)

306. Part, Lee, Y., Won, D.: Enhancing of a password-based authentication scheme using smart cards. Lecture Notes in

Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),

vol. 5871 LNCS, pp. 879-886 (2009)

307. Patel, S.N., Pierce, J.S., Abowd, G.D.: A gesture-based authentication scheme for untrusted public terminals. In:

Proceedings of the 17th annual ACM symposium on User interface software and technology, pp. 157-160. ACM,

(2004)

308. Pham, T., Ma, W., Tran, D., Nguyen, P., Phung, D.: Multi-factor EEG-based user authentication. In: Proceedings of

the International Joint Conference on Neural Networks, pp. 4029-4034. (2014)

309. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: A novel smart card mutual authentication scheme for session transfer among

registered devices. In: Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013,

pp. 1540-1547. (2013)

310. Polakis, I., Ilia, P., Maggi, F., Lancini, M., Kontaxis, G., Zanero, S., Ioannidis, S., Keromytis, A.D.: Faces in the

distorting mirror: Revisiting photo-based social authentication. In: Proceedings of the ACM Conference on Computer

and Communications Security, pp. 501-512. (2014)

311. Pooja, D., Shilpi, G., Sujata, S., Vinita, G.: SECURED AUTHENTICATION: 3D PASSWORD‖. International

Journal of Engineering and Management Sciences 3, 242-245 (2012)

312. Portnoi, M., Shen, C.C.: Loc-Auth: Location-enabled authentication through attribute-based encryption. In:

International Conference on Computing, Networking and Communications (ICNC), 2015, pp. 89-93. (2015)

313. Priyadharshini, S., Nivetha, D., Anjalikumari, T., Prakash, P.: Mobile controlled door locking system with two-factor

authentication. Advances in Intelligent Systems and Computing, vol. 398, pp. 133-139 (2016)

314. Pu, Q., Wang, J., Zhao, R.: Strong Authentication Scheme for Telecare Medicine Information Systems. Journal of

Medical Systems 36, 2609-2619 (2012)

315. Pu, Q.: An improved two-factor authentication protocol. In: 2010 International Conference on MultiMedia and

Information Technology, MMIT 2010, pp. 223-226. (2010)

316. Qian, H., Surapaneni, C.S., Dispensa, S., Medhi, D.: Service management architecture and system capacity design for

phonefactorTM-A two-factor authentication service. In: 2009 IFIP/IEEE International Symposium on Integrated

Network Management, IM 2009, pp. 73-80. (2009)

317. Qian, H., Surapaneni, C.S., Ray, M., Dispensa, S., Medhi, D.: DReaM-Cache: Distributed real-time transaction

memory cache to support two-factor authentication services and its reliability. In: Proceedings of the 2010 IEEE/IFIP

Network Operations and Management Symposium, NOMS 2010, pp. 333-340. (2010)

318. Qu, J., Tan, X.L.: Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem.

Journal of Electrical and Computer Engineering 2014, (2014)

319. Ramasamy, R., Muniyandi, A.P.: An Efficient Password Authentication Scheme for Smart Card. IJ Network Security

14, 180-186 (2012)

320. Rao, T.V.N., Vedavathi, K.: Authentication using mobile phone as a security token. IJCSET 1, 569-574 (2011)

321. Ren, X., Wu, X.-W., Tang, K.: TSPass: A Dynamic User Authentication Scheme Based On Time and Space. IJCSNS

12, 45 (2012)

322. Resende, A.C.D., Mochetti, K., Aranha, D.F.: PUF-based mutual multifactor entity and transaction authentication for

secure banking. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and

Lecture Notes in Bioinformatics), vol. 9542, pp. 77-96 (2016)

323. Rhee, H.S., Kwon, J.O., Lee, D.H.: A remote user authentication scheme without using smart cards. Computer

Standards & Interfaces 31, 6-13 (2009)

324. Sabzevar, A.P., Stavrou, A.: Universal multi-factor authentication using graphical passwords. In: SITIS 2008 -

Proceedings of the 4th International Conference on Signal Image Technology and Internet Based Systems, pp. 625-

632. (2008)

325. Sarier, N.D.: A survey of distributed biometric authentication systems. In: Lecture Notes in Informatics (LNI),

Proceedings - Series of the Gesellschaft fur Informatik (GI), pp. 129-140. (2009)

326. Sarier, N.D.: Improving the accuracy and storage cost in biometric remote authentication schemes. Journal of

Network and Computer Applications 33, 268-274 (2010)

327. Sarika, T., Nawaz, S.S.: Multi-factor user authentication in wireless sensor networks. Int J Comput Sci Telecommun

2, 59-63 (2011)

328. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Secure and Light Weight Authentication Service in Hadoop

using One Time Pad. Procedia Computer Science 50, 81-86 (2015)

329. Saxena, A.: Dynamic authentication: Need than a choice. In: 3rd IEEE/Create-Net International Conference on

Communication System Software and Middleware, COMSWARE, pp. 214-218. (2007)

330. Selcuk Uluagac, A., Liu, W., Beyah, R.: A multi-factor re-authentication framework with user privacy. In: 2014

IEEE Conference on Communications and Network Security, CNS 2014, pp. 504-505. (2014)

331. Sery, P.: Tighter SSH security with two-factor authentication. Linux J. 2006, 3 (2006)

332. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: Security enhancement for the timestamp-based password authentication

scheme using smart cards. Computers & Security 22, 591-595 (2003)

333. Shiuh-Jeng, W., Jin-Fu, C.: Smart card based secure password authentication scheme. Computers & Security 15,

231-237 (1996)

334. Shunmuganathan, S., Saravanan, R.D., Palanichamy, Y.: Secure and efficient smart-card-based remote user

authentication scheme for multiserver environment. Canadian Journal of Electrical and Computer Engineering 38,

20-30 (2015)

335. Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Cryptanalysis and improvement of ‘a secure

authentication scheme for telecare medical information system’ with nonce verification. Peer-to-Peer Networking

and Applications (2015)

336. Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Smart environment as a service: Three factor cloud based

user authentication for telecare medical information system. Journal of Medical Systems 38, (2014)

337. Singh, A., Rishi, R.: An improved two-factor authenticated key exchange protocol in public wireless LANs. In:

International Conference on Advanced Computing and Communication Technologies, ACCT, pp. 226-230. (2013)

338. Singh, V., Dahiya, P., Singh, S.: Smart card based password authentication and user anonymity scheme using ECC

and steganography. In: Proceedings of the 2014 International Conference on Advances in Computing,

Communications and Informatics, ICACCI 2014, pp. 1614-1621. (2014)

339. Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32, 321-

325 (2010)

340. Sood, S.K., Sarje, A.K., Singh, K.: A secure dynamic identity based authentication protocol for multi-server

architecture. Journal of Network and Computer Applications 34, 609-618 (2011)

341. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Liao et al.'s authentication scheme using smart cards. In:

Advance Computing Conference (IACC), 2010 IEEE 2nd International, pp. 240-245. IEEE, (2010)

342. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.'s authentication scheme using smart cards. In:

Proceedings of the third annual ACM Bangalore conference, pp. 15. ACM, (2010)

343. Sood, S.K.: An improved and secure smart card based dynamic identity authentication protocol. International Journal

of Network Security 14, 39-46 (2012)

344. Stockdale, J., Vakaloudis, A., Escaño, J.M., Liang, J., Cahill, B.: A fuzzy system for three-factor, non-textual

authentication. Studies in Computational Intelligence, vol. 591, pp. 125-137 (2015)

345. Suh, J.: Veri-Pen: A Pen-based Identification Through Natural Biometrics Extraction. Proceedings of the 2016 CHI

Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA

(2016)

346. Sukarno, P., Bhattacharjee, N.: Authentication Architecture Based on Crypto-biometric Systems. In: Proceedings of

the 2008 International Conference on Security and Management, SAM 2008, pp. 638-644. (2008)

347. Sun, D.-Z., Huai, J.-P., Sun, J.-Z., Li, J.-X., Zhang, J.-W., Feng, Z.-Y.: Improvements of Juang's password-

authenticated key agreement scheme using smart cards. IEEE Transactions on industrial electronics 56, 2284-2291

(2009)

348. Sun, D.Z., Li, J.X., Feng, Z.Y., Cao, Z.F., Xu, G.Q.: ON the security and improvement of a two-factor user

authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing 17, 895-905 (2013)

349. Sun, H.-M., Chen, Y.-H., Lin, Y.-H.: oPass: A user authentication protocol resistant to password stealing and

password reuse attacks. IEEE transactions on information forensics and security 7, 651-663 (2012)

350. Sun, J., Zhang, R., Zhang, J., Zhang, Y.: TouchIn: Sightless two-factor authentication on multi-touch mobile devices.

In: 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 436-444. (2014)

351. Svogor, I., Kisasondi, T.: Two factor authentication using EEG augmented passwords. In: Proceedings of the

International Conference on Information Technology Interfaces, ITI, pp. 373-378. (2012)

352. Tan, Z.: A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

Journal of Medical Systems 38, (2014)

353. Tan, Z.: An authentication and key agreement scheme with key confirmation and privacy-preservation for multi-

server environments. Journal of Computers 6, 2295-2301 (2011)

354. Tan, Z.: An efficient biometrics-based authentication scheme for telecare medicine information systems. network 2,

200-204 (2013)

355. Tan, Z.: Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks. Advances in

Information Sciences and Service Sciences 3, 117-126 (2011)

356. Tang, H.B., Liu, X.S., Li, Y.: Cryptanalysis of a biometric-based remote user authentication scheme. In: International

Conference on Information Science and Control Engineering 2012 (ICISCE 2012), IET, pp. 1-5. (2012)

357. Tang, H.B., Zhu, Z.J., Gao, Z.W., Li, Y.: A secure biometric-based authentication scheme using smart card. In:

International Conference on Cyberspace Technology (CCT 2013), pp. 39-43. (2013)

358. Tian, X., Zhu, R.W., Wong, D.S.: Improved Efficient Remote User Authentication Schemes. IJ Network Security 4,

149-154 (2007)

359. Ting, S.L., Tsang, A.H.C.: A two-factor authentication system using Radio Frequency Identification and

watermarking technology. Computers in Industry 64, 268-279 (2013)

360. Tiwari, A., Sanyal, S., Abraham, A., Knapskog, S.J., Sanyal, S.: A multi-factor security protocol for wireless

payment-secure web authentication using mobile devices. arXiv preprint arXiv:1111.3010 (2011)

361. Tritilanunt, S., Thanyamanorot, N., Ritdecha, N.: A secure authentication protocol using HOTP on USB storage

devices. In: International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), 2014,

pp. 1908-1912. (2014)

362. Tsague, H.D., Nelwamondo, F., Msimang, N.: An advanced mutual-authentication algorithm using 3DES for smart

card systems. In: Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International

Conference on Social Computing and Its Applications, CGC/SCA 2012, pp. 660-666. (2012)

363. Tsaur, W.-J., Li, J.-H., Lee, W.-B.: An efficient and secure multi-server authentication scheme with key agreement.

Journal of Systems and Software 85, 876-882 (2012)

364. Tsaur, W.-J., Wu, C.-C., Lee, W.-B.: A smart card-based remote scheme for password authentication in multi-server

Internet services. Computer Standards & Interfaces 27, 39-51 (2004)

365. Turkanovic, M., Holbl, M.: An improved dynamic password-based user authentication scheme for hierarchical

wireless sensor networks. Elektronika ir Elektrotechnika 19, 109-116 (2013)

366. Ullah, S., Xuefeng Dr, Z., Feng Dr, Z.: TCLOUD: A Multi - factor access control framework for cloud computing.

International Journal of Security and its Applications 7, 15-26 (2013)

367. Urien, P.: Introducing TLS-PSK authentication for EMV devices. In: Collaborative Technologies and Systems

(CTS), 2010 International Symposium on, pp. 371-377. (2010)

368. Uymatiao, M.L.T., Yu, W.E.S.: Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme

using TLS seed exchange and encrypted offline keystore. In: ICIST 2014 - Proceedings of 2014 4th IEEE

International Conference on Information Science and Technology, pp. 225-229. (2014)

369. Vaidya, B., Makrakis, D., Mouftah, H.: Two‐factor mutual authentication with key agreement in wireless sensor

networks. Security and Communication Networks (2012)

370. Vaidya, B., Makrakis, D., Mouftah, H.: Two-factor mutual authentication with key agreement in wireless sensor

networks. Security and Communication Networks 9, 171-183 (2016)

371. Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two-factor user authentication in wireless sensor networks. In:

2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications,

WiMob'2010, pp. 600-606. (2010)

372. Vaka, V., Lindskog, D., Zavarsky, P.: Enhancing of biometric authentication with pass strings and cryptographic

checksums. In: 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 170-170. (2016)

373. Virgile, K., Yu, H.: Securing cloud emails using two factor authentication based on password/apps in cloud

computing. International Journal of Security and its Applications 9, 121-130 (2015)

374. Wang, B., Wang, Y., Zhang, H.: A new secure password authentication scheme using smart cards. Wuhan University

Journal of Natural Sciences 13, 739-743 (2008)

375. Wang, D., Ma, C.-g., Wang, P., Chen, Z.: Robust smart card based password authentication scheme against smart

card security breach. (2012)

376. Wang, D., Ma, C.-g.: Cryptanalysis and security enhancement of a remote user authentication scheme using smart

cards. The Journal of China Universities of Posts and Telecommunications 19, 104-114 (2012)

377. Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: Efficient and provably secure two-factor

authentication scheme with user anonymity. Information Sciences 321, 162-178 (2015)

378. Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile

networks. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 3136-3141. (2014)

379. Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: A two-factor lightweight privacy-preserving authentication

scheme for VANET. IEEE Transactions on Vehicular Technology 65, 896-911 (2016)

380. Wang, F., Zhang, Y., Xu, Y., Wu, L., Diao, B.: A DoS-resilient enhanced two-factor user authentication scheme in

wireless sensor networks. In: International Conference on Computing, Networking and Communications (ICNC),

2014, pp. 1096-1102. IEEE, (2014)

381. Wang, N.-W., Chao, H.-C., Chen, I.-Y., Huang, Y.-M.: A novel user’s authentication scheme for pervasive on-line

media services. Telecommunication Systems 44, 181-190 (2010)

382. Wang, R.C., Juang, W.S., Lei, C.L.: A robust authentication scheme with user anonymity for wireless environments.

International Journal of Innovative Computing, Information and Control 5, 1069-1080 (2009)

383. Wang, R.-C., Juang, W.-S., Lei, C.-L.: Robust authentication and key agreement scheme preserving the privacy of

secret key. Computer Communications 34, 274-280 (2011)

384. Wang, Y.-y., Liu, J.-y., Xiao, F.-x., Dan, J.: A more efficient and secure dynamic ID-based remote user

authentication scheme. Computer communications 32, 583-585 (2009)

385. Wangsuk, K., Anusas-amornkul, T.: Trajectory Mining for Keystroke Dynamics Authentication. Procedia Computer

Science 24, 175-183 (2013)

386. Wazid, M., Das, A.K., Kumari, S., Li, X., Wu, F.: Design of an efficient and provably secure anonymity preserving

three-factor user authentication and key agreement scheme for TMIS. Security and Communication Networks (2016)

387. Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. Journal of

Medical Systems 36, 3597-3604 (2012)

388. Wei, J., Liu, W., Hu, X.: Cryptanalysis and improvement of a robust smart card authentication scheme for multi-

server architecture. Wireless Personal Communications 77, 2255-2269 (2014)

389. Wen, F., Guo, D.: An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems.

Journal of Medical Systems 38, 1-11 (2014)

390. Wen, F., Li, X., Cui, S.: An improved dos-resistant id-based password authentication scheme without using smart

card. Journal of Electronics (China) 28, 580-586 (2011)

391. Wen, F., Susilo, W., Yang, G.: Analysis and Improvement on a Biometric-Based Remote User Authentication

Scheme Using Smart Cards. Wireless Personal Communications 80, 1747-1760 (2015)

392. Wen, F.: A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System.

Journal of Medical Systems 38, 1-7 (2014)

393. Wen, F.: A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected

Health Care. Journal of Medical Systems 37, 1-9 (2013)

394. Wong, F.W.M.H., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing

biometrics with artificial neural networks and k-nearest neighbor algorithm. In: Signals, Systems and Computers,

2001. Conference Record of the Thirty-Fifth Asilomar Conference on, pp. 911-915. IEEE, (2001)

395. Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: A secure authentication scheme with anonymity for wireless communications.

IEEE Communications Letters 12, 722-723 (2008)

396. Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal

proof. Peer-to-Peer Networking and Applications 1-15 (2015)

397. Wu, F., Xu, L., Kumari, S., Li, X.: A novel and provably secure biometrics-based three-factor remote authentication

scheme for mobile client-server networks. Computers and Electrical Engineering 45, 274-285 (2015)

398. Wu, F., Xu, L., Kumari, S., Li, X.: An improved and anonymous two-factor authentication protocol for health-care

applications with wireless medical sensor networks. Multimedia Systems (2015)

399. Wu, S., Kang, F., Pu, Q.: Practical remote mutual authentication with key agreement scheme for mobile devices on

elliptic curve cryptosystem. Journal of Internet Technology 13, 411-418 (2012)

400. Wu, S., Zhu, Y.: Improved two-factor authenticated key exchange protocol. Int. Arab J. Inf. Technol. 8, 430-439

(2011)

401. Wu, T.-C.: Remote login authentication scheme based on a geometric approach. Computer Communications 18, 959-

963 (1995)

402. Xie, M., Li, Y., Yoshigoe, K., Seker, R., Bian, J.: CamAuth: Securing Web Authentication with Camera. In: 2015

IEEE 16th International Symposium on High Assurance Systems Engineering, pp. 232-239. (2015)

403. Xie, Q., Dong, N., Wong, D.S., Hu, B.: Cryptanalysis and security enhancement of a robust two‐factor authentication

and key agreement protocol. International Journal of Communication Systems (2014)

404. Xie, Q., Dong, N., Wong, D.S., Hu, B.: Cryptanalysis and security enhancement of a robust two-factor authentication

and key agreement protocol. International Journal of Communication Systems 29, 478-487 (2016)

405. Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service

in global mobility network. Wireless Personal Communications 74, 601-614 (2014)

406. Xie, Q., Liu, W.-h., Wang, S.-b., Hu, B., Dong, N., Yu, X.-y.: Robust password and smart card based authentication

scheme with smart card revocation. Journal of Shanghai Jiaotong University (Science) 19, 418-424 (2014)

407. Xie, Q., Zhang, J., Dong, N.: Robust Anonymous Authentication Scheme for Telecare Medical Information Systems.

Journal of Medical Systems 37, 1-8 (2013)

408. Xie, Q.: Improvement of a security enhanced one-time two-factor authentication and key agreement scheme. Scientia

Iranica 19, 1856-1860 (2012)

409. Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable

security. Computer Standards & Interfaces 31, 723-728 (2009)

410. Xu, L., Wu, F.: An improved and provable remote user authentication scheme based on elliptic curve cryptosystem

with user anonymity. Security and Communication Networks 8, 245-260 (2015)

411. Xu, L., Wu, F.: Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and

Anonymity for Connected Health Care. Journal of Medical Systems 39, 1-9 (2015)

412. Xu, Q., Huang, P., Yang, T.: An enhanced biometrics-key-based remote user authentication scheme with smart card.

Jisuanji Yanjiu yu Fazhan/Computer Research and Development 52, 2645-2655 (2015)

413. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L.: A secure and efficient authentication and key agreement scheme

based on ECC for telecare medicine information systems. Journal of Medical Systems 38, (2014)

414. yang, C.-C., Wang, R.-C.: An improvement of security enhancement for the timestamp-based password

authentication scheme using smart cards. SIGOPS Oper. Syst. Rev. 38, 91-96 (2004)

415. Yang, D., Yang, B.: A biometric password-based multi-server authentication scheme with smart card. In:

International Conference on Computer Design and Applications (ICCDA), 2010, pp. V5-554-V555-559. IEEE,

(2010)

416. Yang, D., Yang, B.: A new password authentication scheme using fuzzy extractor with smart card. In: International

Conference on Computational Intelligence and Security, 2009. CIS'09., pp. 278-282. IEEE, (2009)

417. Yang, D.Y.B., Yang, B.: A novel multi-factor authenticated key exchange scheme with privacy preserving. Journal

of Internet Services and Information Security 1, 44-56 (2011)

418. Yang, G., Wong, D.S., Wang, H., Deng, X.: Formal analysis and systematic construction of two-factor authentication

scheme (short paper). In: International Conference on Information and Communications Security, pp. 82-91.

Springer, (2006)

419. Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords.

Journal of Computer and System Sciences 74, 1160-1172 (2008)

420. Yang, L., Ma, J.-F., Jiang, Q.: Mutual Authentication Scheme with Smart Cards and Password under Trusted

Computing. IJ Network Security 14, 156-163 (2012)

421. Yang, W.-H., Shieh, S.-P.: Password authentication schemes with smart cards. Computers & Security 18, 727-733

(1999)

422. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W., Zou, D.: Efficient password-based two factors authentication in cloud

computing. International Journal of Security and its Applications 6, 143-148 (2012)

423. Yassin, A.A., Jin, H., Ibrahim, A., Zou, D.: Anonymous password authentication scheme by using digital signature

and fingerprint in cloud computing. In: Proceedings - 2nd International Conference on Cloud and Green Computing

and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012, pp. 282-289. (2012)

424. Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust elliptic curve cryptography-based three factor user

authentication providing privacy of biometric data. IET Information Security 7, 247-252 (2013)

425. Yeole, A.S.: Proposal for novel 3D password for providing authentication in critical web applications. In:

International Conference and Workshop on Emerging Trends in Technology 2011, ICWET 2011 - Conference

Proceedings, pp. 663-666. (2011)

426. Yildiz, M., M, G., x0F, kt, x0Fc, rk: Combining Biometric ID Cards and Online Credit Card Transactions. In: Fourth

International Conference on Digital Society, 2010. ICDS '10., pp. 20-24. (2010)

427. Yin, D.B.M., Kamal, M.I., Azmanuddin, N.S., Ali, S.H.S., Othman, A.T., Chik, R.Z.W.: Electronic Door Access

Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-

based Face Recognition using Principal Component Analysis. Proceedings of the 10th International Conference on

Ubiquitous Information Management and Communication. ACM, Danang, Viet Nam (2016)

428. Yoo, S., Shin, S.J., Ryu, D.H.: An innovative two factor authentication method: The QRLogin system. International

Journal of Security and its Applications 7, 293-302 (2013)

429. Yoo, S.G., Lee, H., Kim, J.: A performance and usability aware secure two-factor user authentication scheme for

wireless sensor networks. International Journal of Distributed Sensor Networks 2013, (2013)

430. Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: An improvement of Hwang–Lee–Tang's simple remote user authentication

scheme. Computers & Security 24, 50-56 (2005)

431. Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: Further improvement of an efficient password based remote user authentication

scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 612-614 (2004)

432. Yoon, E.J., Yoo, K.Y.: A three-factor authenticated key agreement scheme for SIP on elliptic curves. In: Proceedings

- 2010 4th International Conference on Network and System Security, NSS 2010, pp. 334-339. (2010)

433. Yoon, E.-J., Yoo, K.-Y.: Robust biometrics-based multi-server authentication with key agreement scheme for smart

cards on elliptic curve cryptosystem. The Journal of Supercomputing 63, 235-255 (2013)

434. Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient generic framework for three-factor authentication with provably

secure instantiation. IEEE Transactions on Information Forensics and Security 9, 2302-2313 (2014)

435. Yu, Z., Jingchun, X., Dake, H.: Trusted user authentication scheme combining password with fingerprint for mobile

devices. In: Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on, pp. 1-8.

(2008)

436. Yuan, J.-J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems

55, 105-113 (2014)

437. Zhang, L., Tang, S., Chen, J., Zhu, S.: Two-Factor Remote Authentication Protocol with User Anonymity Based on

Elliptic Curve Cryptography. Wireless Personal Communications 81, 53-75 (2015)

438. Zhang, M., Zhang, J., Zhang, Y.: Remote three-factor authentication scheme based on Fuzzy extractors. Security and

Communication Networks 8, 682-693 (2015)

439. Zhou, W., Yue, Y., Yu, B.: Research of multi-factor identity authentication scheme for ZigBee network nodes.

Xitong Fangzhen Xuebao / Journal of System Simulation 27, 762-769 (2015)

440. Zhu, H., Lin, X., Zhang, Y., Lu, R.: Duth: A user-friendly dual-factor authentication for Android smartphone

devices. Security and Communication Networks 8, 1213-1222 (2015)

441. Zhu, Z.: An Efficient Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical

Systems 36, 3833-3838 (2012)

442. Ziauddin, S.: A two-factor mutual authentication scheme using biometrics and smart card. Communications in

Computer and Information Science, vol. 58, pp. 209-216 (2009)

Acceptance Topic 3 (AT3): Comparison and Selection Criteria

1. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., Sakurai, K.: Authentication in mobile cloud computing: A

survey. Journal of Network and Computer Applications 61, 59-80 (2016)

2. Anwar, M., Imran, A.: A comparative study of graphical and alphanumeric passwords for mobile device

authentication. In: CEUR Workshop Proceedings, pp. 13-18. (2015)

3. Borde, D.d.: Selecting a two-factor authentication system. Network Security 2007, 17-20 (2007)

4. Bruun, A., Jensen, K., Kristensen, D.: Usability of single-and multi-factor authentication methods on tabletops: A

comparative study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence

and Lecture Notes in Bioinformatics), vol. 8742, pp. 299-306 (2014)

5. Choksi, S.: Comparative Study on Authentication Schemes for Cloud Computing. In: International Journal of

Engineering Development and Research. IJEDR, (2014)

6. Gunson, N., Marshall, D., Morton, H., Jack, M.: User perceptions of security and usability of single-factor and two-

factor authentication in automated telephone banking. Computers and Security 30, 208-220 (2011)

7. Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: Proceedings of the 2nd International

Symposium on Human Aspects of Information Security and Assurance, HAISA 2008, pp. 80-93. (2008)

8. Hua, R., Zhang, R., Li, D.: Security analysis of authentication schemes in M-commerce based on fuzzy

comprehensive evaluation. In: ICISO 2010 - Proceedings of the 12th International Conference on Informatics and

Semiotics in Organisations, IFIP WG8.1 Working Conference, pp. 245-251. (2010)

9. Jansen, W.: Authenticating users on handheld devices. In: Proceedings of the Canadian Information Technology

Security Symposium, pp. 1-12. (2003)

10. Kiljan, S., Vranken, H., van Eekelen, M.: Evaluation of transaction authentication methods for online banking.

Future Generation Computer Systems (2016)

11. Kumari, S., Khan, M.K., Atiquzzaman, M.: User authentication schemes for wireless sensor networks: A review. Ad

Hoc Networks 27, 159-194 (2015)

12. Madhusudhan, R., Mittal, R.C.: Dynamic ID-based remote user password authentication schemes using smart cards:

A review. Journal of Network and Computer Applications 35, 1235-1248 (2012)

13. O'Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91,

2021-2040 (2003)

14. Park, K.C., Shin, J.W., Lee, B.G.: Analysis of Authentication Methods for Smartphone Banking Service using ANP.

TIIS 8, 2087-2103 (2014)

15. Ruoti, S., Roberts, B., Seamons, K.: Authentication Melee: A Usability Analysis of Seven Web Authentication

Systems. Proceedings of the 24th International Conference on World Wide Web. ACM, Florence, Italy (2015)

16. Skracic, K., Pale, P., Jeren, B.: Knowledge based authentication requirements. In: 2013 36th International

Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2013 -

Proceedings, pp. 1116-1120. (2013)

17. Zviran, M., Erlich, Z.: Identification and authentication: technology and implementation issues. Communications of

the Association for Information Systems 17, 4 (2006)

Acceptance Topic 4 (AT4): Decision Frameworks

1. Altinkemer, K., Wang, T.: Cost and benefit analysis of authentication systems. Decision Support Systems 51, 394-

404 (2011)

2. Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: A framework for

comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553-

567. IEEE, (2012)

3. Eliasson, C., Fiedler, M., Jørstad, I.: A criteria-based evaluation framework for authentication schemes in IMS. In:

Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 865-869. (2009)

4. Forget, A., Chiasson, S., Biddle, R.: User-centred authentication feature framework. Information and Computer

Security 23, 497-515 (2015)

5. Guel, M.D.: A Framework for Choosing Your Next Generation Authentication/Authorization System. Information

Security Technical Report 7, 63-78 (2002)

6. Kim, J.Y.: Efficiency of Paid Authentication Methods for Mobile Devices. Wireless Personal Communications 1-9

(2016)

7. Palmer, A.J.: Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA).

Computers and Security 29, 785-806 (2010)

8. Wang, D., Gu, Q., Cheng, H., Wang, P.: The Request for Better Measurement: A Comparative Evaluation of Two-

Factor Authentication Schemes. Proceedings of the 11th ACM on Asia Conference on Computer and

Communications Security. ACM, Xi'an, China (2016)