Accepted Articles for Authentication Schemes and Methods: a
Systematic Literature Review
Acceptance Topic 1 (AT1): Authentication Schemes
1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band
Authentication Using Image-Based One Time Password in the Cloud
Environment. International Journal of Security and Its Applications
(IJSIA) 9, 35-46 (2015)
2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level
approach to EEG based human authentication using eye blinking.
Pattern Recognition Letters (2015)
3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A
comparative approach between cepstral features for human
authentication using heart sounds. Signal, Image and Video
Processing 10, 843-851 (2016)
4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt,
R., Kam, M.: User authentication through biometric sensors and
decision fusion. In: 2013 47th Annual Conference on Information
Sciences and Systems, CISS 2013. (2013)
5. Adida, B.: EmID: Web authentication by email address. In:
Proceedings of Web. (2008)
6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik,
S.W.: Analysis of interaction trace maps for active authentication
on smart devices. Multimedia Tools and Applications 1-19 (2016)
7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical
passwords for augmenting, not replacing, text passwords.
Proceedings of the 29th Annual Computer Security Applications
Conference. ACM, New Orleans, Louisiana, USA (2013)
8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making
Random Passwords Memorable: Leveraging Users' Cognitive Ability
Through Multiple Cues. Proceedings of the 33rd Annual ACM
Conference on Human Factors in Computing Systems. ACM, Seoul,
Republic of Korea (2015)
9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography
and biometric cryptosystems for secure mutual authentication and
key exchange. In: 2013 8th International Conference for Internet
Technology and Secured Transactions, ICITST 2013, pp. 369-374.
(2013)
10. Ali, A.M.: Zero footprint secure internet authentication
using network smart card. Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), vol. 3928 LNCS, pp. 91-104
(2006)
11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke
Biometric Systems for User Authentication. Journal of Signal
Processing Systems 1-16 (2016)
12. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel
image-based implicit password authentication system (IPAS) for
mobile and non-mobile devices. Mathematical and Computer Modelling
58, 108-116 (2013)
13. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: IPAS:
Implicit password authentication system. In: IEEE Workshops of
International Conference on Advanced Information Networking and
Applications (WAINA), 2011, pp. 430-435. IEEE, (2011)
14. Almulhem, A.: A graphical password authentication system.
In: 2011 World Congress on Internet Security (WorldCIS), pp.
223-225. (2011)
15. Alrawais, A., Alhothaily, A., Cheng, X.: Secure
authentication scheme using dual channels in rogue access point
environments. Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 8491, pp. 554-563 (2014)
16. Alzomai, M., Alfayyadh, B., Jøsang, A.: Display security for
online transactions: SMS-based authentication scheme. In: 2010
International Conference for Internet Technology and Secured
Transactions, ICITST 2010. (2010)
17. Alzomai, M., Jøsang, A., McCullagh, A., Foo, E.:
Strengthening SMS-based authentication through usability. In:
Proceedings of the 2008 International Symposium on Parallel and
Distributed Processing with Applications, ISPA 2008, pp. 683-688.
(2008)
18. Amin, R., Biswas, G.P.: A Novel User Authentication and Key
Agreement Protocol for Accessing Multi-Medical Server Usable in
TMIS. Journal of Medical Systems 39, 1-17 (2015)
19. Amin, R., Biswas, G.P.: Cryptanalysis and Design of a
Three-Party Authenticated Key Exchange Protocol Using Smart Card.
Arabian Journal for Science and Engineering 40, 3135-3149
(2015)
20. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.:
An Efficient and Practical Smart Card Based Anonymity Preserving
User Authentication Scheme for TMIS using Elliptic Curve
Cryptography. Journal of Medical Systems 39, 1-18 (2015)
21. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I.,
Cameron, D., Fischer, M.H.: VIP: a visual approach to user
authentication. Proceedings of the Working Conference on Advanced
Visual Interfaces. ACM, Trento, Italy (2002)
22. Annapurani, K., Sadiq, M.A.K., Malathy, C.: Fusion of shape
of the ear and tragus – A unique feature extraction method for ear
authentication system. Expert Systems with Applications 42, 649-656
(2015)
23. Antal, M., Szabó, L.Z.: Biometric Authentication Based on
Touchscreen Swipe Patterns. Procedia Technology 22, 862-869
(2016)
24. Arif, A., Pahud, M., Hinckley, K., Buxton, W.: A tap and
gesture hybrid method for authenticating smartphone users.
Proceedings of the 15th international conference on Human-computer
interaction with mobile devices and services. ACM, Munich, Germany
(2013)
25. Arthur Evans, Jr., Kantrowitz, W., Weiss, E.: A user
authentication scheme not requiring secrecy in the computer.
Commun. ACM 17, 437-442 (1974)
26. Assaad, F.S., Serpen, G.: Transformation based Score Fusion
Algorithm for Multi-modal Biometric User Authentication through
Ensemble Classification. Procedia Computer Science 61, 410-415
(2015)
27. Atallah, M.J., Frikken, K.B., Goodrich, M.T., Tamassia, R.:
Secure biometric authentication for weak computational devices. In:
Lecture Notes in Computer Science, pp. 357-371. (2005)
28. Awasthi, A.K., Lal, S.: A remote user authentication scheme
using smart cards with forward secrecy. IEEE Transactions on
Consumer Electronics 49, 1246-1248 (2003)
29. Awasthi, A.K., Lal, S.: An enhanced remote user
authentication scheme using smart cards. IEEE Transactions on
Consumer Electronics 50, 583-586 (2004)
30. Awasthi, A.K., Srivastava, K.: A Biometric Authentication
Scheme for Telecare Medicine Information Systems with Nonce.
Journal of Medical Systems 37, 1-4 (2013)
31. Aykut, M., Ekinci, M.: Developing a contactless palmprint
authentication system by introducing a novel ROI extraction method.
Image and Vision Computing 40, 65-74 (2015)
32. Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy
approach to multimodal biometric continuous authentication. Fuzzy
Optimization and Decision Making 7, 243-256 (2008)
33. Babu, B.S., Venkataram, P.: An authentication scheme for
personalized mobile multimedia services: A cognitive agents based
approach. In: Proceedings of Future Generation Communication and
Networking, FGCN 2007, pp. 167-172. (2007)
34. Babu, B.S., Venkataram, P.: Cognitive agents based
authentication & privacy scheme for mobile transactions
(CABAPS). Computer Communications 31, 4060-4071 (2008)
35. Bai, Z., Hatzinakos, D.: LBP-based biometric hashing scheme
for human authentication. In: 11th International Conference on
Control, Automation, Robotics and Vision, ICARCV 2010, pp.
1842-1847. (2010)
36. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User
identification and authentication using multi-modal behavioral
biometrics. Computers & Security 43, 77-89 (2014)
37. Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on
analysis of user behavior. In: Science and Information Conference
(SAI), 2014, pp. 601-606. (2014)
38. Bandyopadhyay, S.K., Bhattacharyya, D., Das, P.: User
authentication by Secured Graphical Password Implementation. In:
Information and Telecommunication Technologies, 2008. APSITT. 7th
Asia-Pacific Symposium on, pp. 7-12. (2008)
39. Banerjee, P.K., Chandra, J.K., Datta, A.K.: Feature based
optimal trade-off parameter selection of frequency domain
correlation filter for real time face authentication. Proceedings
of the 2011 International Conference on Communication, Computing
& Security. ACM, Rourkela, Odisha, India (2011)
40. Bansal, M., Hanmandlu, M., Kumar, P.: IRIS based
authentication using local principal independent components. Optik
- International Journal for Light and Electron Optics 127,
4808-4814 (2016)
41. Bashir, M., Scharfenberg, G., Kempf, J.: Person
Authentication by Handwriting in air using a Biometric Smart Pen
Device. BIOSIG 191, 219-226 (2011)
42. Bennet, D., Arumugaperumal, S.: Fingerprint based
multi-server authentication system. In: International Conference on
Electronics Computer Technology (ICECT), 2011 3rd, pp. 115-119.
(2011)
43. Best, D.S., Duchowski, A.T.: A rotary dial for gaze-based
PIN entry. Proceedings of the Ninth Biennial ACM Symposium on Eye
Tracking Research & Applications. ACM, Charleston, South
Carolina (2016)
44. Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.:
Bio-authentication for layered remote health monitor framework.
Journal of Medical Informatics & Technologies 23, (2014)
45. Bianchi, A., Oakley, I., Kwon, D.S.: The secure haptic
keypad: a tactile password system. Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems. ACM, Atlanta,
Georgia, USA (2010)
46. Bianchi, A., Oakley, I., Kwon, D.S.: Using mobile device
screens for authentication. Proceedings of the 23rd Australian
Computer-Human Interaction Conference. ACM, Canberra, Australia
(2011)
47. Bicakci, K., Oorschot, P.C.v.: A multi-word password
proposal (gridWord) and exploring questions about science in
security research and usable security evaluation. Proceedings of
the 2011 workshop on New security paradigms workshop. ACM, Marin
County, California, USA (2011)
48. Binu, S., Misbahuddin, M., Raj, P.: A Single Sign on based
secure remote user authentication scheme for Multi-Server
Environments. In: International Conference on Computer and
Communications Technologies (ICCCT), 2014, pp. 1-6. (2014)
49. Borisov, A.: A Novel Approach for User Authentication to
Industrial Components Using QR Codes. In: Computer Software and
Applications Conference (COMPSAC), 2015 IEEE 39th Annual, pp.
61-66. IEEE, (2015)
50. Boudguiga, A., Laurent, M.: An ID-based authentication
scheme for the IEEE 802.11s mesh network. In: 2010 IEEE 6th
International Conference on Wireless and Mobile Computing,
Networking and Communications, WiMob'2010, pp. 256-263. (2010)
51. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.:
Fourth-factor authentication: somebody you know. Proceedings of the
13th ACM conference on Computer and communications security. ACM,
Alexandria, Virginia, USA (2006)
52. Brown, M., Doswell, F.R.: Using passtones instead of
passwords. Proceedings of the 48th Annual Southeast Regional
Conference. ACM, Oxford, Mississippi (2010)
53. Bulling, A., Alt, F., Schmidt, A.: Increasing the security
of gaze-based cued-recall graphical passwords using saliency masks.
Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems. ACM, Austin, Texas, USA (2012)
54. Cagalj, M., Perkovic, T., Bugaric, M.: Timing attacks on
cognitive authentication schemes. IEEE Transactions on Information
Forensics and Security 10, 584-596 (2015)
55. Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and
improvements to an RIFD mutual authentication protocol and its
extensions. Proceedings of the second ACM conference on Wireless
network security. ACM, Zurich, Switzerland (2009)
56. Carter, N.J.: Graphical Passwords for Older Computer Users.
Adjunct Proceedings of the 28th Annual ACM Symposium on User
Interface Software & Technology. ACM, Daegu, Kyungpook,
Republic of Korea (2015)
57. Catuogno, L., Galdi, C.: On user authentication by means of
video events recognition. Journal of Ambient Intelligence and
Humanized Computing 5, 909-918 (2014)
58. Chang, C.-C., Hsueh, W.-Y., Cheng, T.-F.: A Dynamic User
Authentication and Key Agreement Scheme for Heterogeneous Wireless
Sensor Networks. Wireless Personal Communications 89, 447-465
(2016)
59. Chang, Y.-F., Chang, C.-C., Kuo, J.-Y.: A secure one-time
password authentication scheme using smart cards without limiting
login times. SIGOPS Oper. Syst. Rev. 38, 80-90 (2004)
60. Chatzis, V., Bors, A.G., Pitas, I.: Multimodal
decision-level fusion for person authentication. IEEE transactions
on systems, man, and cybernetics-part a: systems and humans 29,
674-680 (1999)
61. Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K.: An
Improved and Secure Biometric Authentication Scheme for Telecare
Medicine Information Systems Based on Elliptic Curve Cryptography.
Journal of Medical Systems 39, 1-12 (2015)
62. Chaudhry, S.A.: A secure biometric based multi-server
authentication scheme for social multimedia networks. Multimedia
Tools and Applications 1-21 (2016)
63. Chelliah, B., Geetha, S.: Enhancing E-Payment Security
through Biometric Based Personal Authentication Using Steganography
Scheme - B-PASS. Communications in Computer and Information
Science, vol. 420 CCIS, pp. 461-472 (2014)
64. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based
remote user password authentication scheme. International Journal
of Communication Systems 27, 377-389 (2014)
65. Chen, C.-L., Deng, Y.-Y.: Conformation of EPC Class 1
Generation 2 standards RFID system with mutual authentication and
privacy protection. Engineering Applications of Artificial
Intelligence 22, 1284-1291 (2009)
66. Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial
recognition: an enhanced biometric authentication system for
smartphones. Proceedings of the 12th annual international
conference on Mobile systems, applications, and services. ACM,
Bretton Woods, New Hampshire, USA (2014)
67. Chen, T., Huang, S.H.: Tree parity machine-based one-time
password authentication schemes. In: Proceedings of the
International Joint Conference on Neural Networks, pp. 257-261.
(2008)
68. Chen, T.-Y., Lee, C.-C., Hwang, M.-S., Jan, J.-K.: Towards
secure and efficient user authentication scheme using smart card
for multi-server environments. The Journal of Supercomputing 66,
1008-1032 (2013)
69. Chen, Y., Chou, J.-S., Sun, H.-M.: A novel mutual
authentication scheme based on quadratic residues for RFID systems.
Computer Networks 52, 2373-2380 (2008)
70. Chen, Y., Chou, J.-S.: ECC-based untraceable authentication
for large-scale active-tag RFID systems. Electronic Commerce
Research 15, 97-120 (2015)
71. Chen, Y., Shu, J., Yang, F., Chen, H.: User authentication
and data cryptograph system based on biometric key for wireless
sensor networks. Journal of Computational Information Systems 9,
3949-3959 (2013)
72. Cheng, F.: A Novel Rubbing Encryption Algorithm and the
Implementation of a Web Based One-Time Password Token. In: 2010
IEEE 34th Annual Computer Software and Applications Conference, pp.
147-154. (2010)
73. Cheng, F.: Security Attack Safe Mobile and Cloud-based
One-time Password Tokens Using Rubbing Encryption Algorithm. Mobile
Networks and Applications 16, 304-336 (2011)
74. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card
based authentication scheme for remote user login and verification.
International Journal of Innovative Computing, Information and
Control 8, 5499-5511 (2012)
75. Cheul Shin, K., Jong Oh, K.: Smartcard-based remote
authentication scheme preserving user anonymity. International
Journal of Information Processing and Management 4, 10-18
(2013)
76. Chiang, H.-Y., Chiasson, S.: Improving user authentication
on mobile devices: a touchscreen graphical password. Proceedings of
the 15th international conference on Human-computer interaction
with mobile devices and services. ACM, Munich, Germany (2013)
77. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme
preserving user anonymity. In: 19th International Conference on
Advanced Information Networking and Applications (AINA'05) Volume 1
(AINA papers), pp. 245-248. IEEE, (2005)
78. Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the
brute-force attack cost and retrieval cost: A hash-based
radio-frequency identification (RFID) tag mutual authentication
protocol. Computers & Mathematics with Applications 69, 58-65
(2015)
79. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against
brute-force attack: A hash-based RFID mutual authentication
protocol using a secret value. Computer Communications 34, 391-397
(2011)
80. Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile
based anti-phishing authentication scheme using QR code. In:
Proceedings - 2011 International Conference on Mobile
IT-Convergence, ICMIC 2011, pp. 109-113. (2011)
81. Choi, S., Zage, D.: Addressing insider threat using “where
you are” as fourth factor authentication. In: Security Technology
(ICCST), 2012 IEEE International Carnahan Conference on, pp.
147-153. (2012)
82. Chou, J.-S.: An efficient mutual authentication RFID scheme
based on elliptic curve cryptography. The Journal of Supercomputing
70, 75-94 (2014)
83. Chowdhury, S., Poet, R., Mackenzie, L.: Passhint: memorable
and secure authentication. Proceedings of the 32nd annual ACM
conference on Human factors in computing systems. ACM, Toronto,
Ontario, Canada (2014)
84. Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.:
Outsourceable two-party privacy-preserving biometric
authentication. Proceedings of the 9th ACM symposium on
Information, computer and communications security. ACM, Kyoto,
Japan (2014)
85. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you
answer me!: transparently authenticating the user of a smartphone
when answering or placing a call. In: Proceedings of the 6th ACM
Symposium on Information, Computer and Communications Security, pp.
249-259. ACM, (2011)
86. Crawford, H., Renaud, K., Storer, T.: A framework for
continuous, transparent mobile device authentication. Computers
& Security 39, Part B, 127-136 (2013)
87. Dabbah, M., Woo, W., Dlay, S.: Secure authentication for
face recognition. In: Computational Intelligence in Image and
Signal Processing, 2007. CIISP 2007. IEEE Symposium on, pp.
121-126. IEEE, (2007)
88. Das, A.K., Bruhadeshwar, B.: An Improved and Effective
Secure Password-Based Authentication and Key Agreement Scheme Using
Smart Cards for the Telecare Medicine Information System. Journal
of Medical Systems 37, 1-17 (2013)
89. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic
password-based user authentication scheme for hierarchical wireless
sensor networks. Journal of Network and Computer Applications 35,
1646-1656 (2012)
90. Das, R.K., Jelil, S., Mahadeva Prasanna, S.R.: Development
of Multi-Level Speech based Person Authentication System. Journal
of Signal Processing Systems 1-13 (2016)
91. David, D.B., Rajappa, M., Karupuswamy, T., Iyer, S.P.: A
Dynamic-Identity Based Multimedia Server Client Authentication
Scheme for Tele-Care Multimedia Medical Information System.
Wireless Personal Communications 85, 241-261 (2015)
92. De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN:
securing PIN entry through indirect input. In: Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, pp.
1103-1106. ACM, (2010)
93. De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: FIRME:
Face and Iris Recognition for Mobile Engagement. Image and Vision
Computing 32, 1161-1172 (2014)
94. De Marsico, M., Nappi, M., Riccio, D.: Face authentication
with undercontrolled pose and illumination. Signal, Image and Video
Processing 5, 401-413 (2011)
95. Denning, T., Bowers, K., Dijk, M.v., Juels, A.: Exploring
implicit memory for painless password recovery. Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems. ACM,
Vancouver, BC, Canada (2011)
96. Dhamija, R., Perrig, A.: Deja Vu-A User Study: Using Images
for Authentication. In: USENIX Security Symposium, pp. 4-4.
(2000)
97. Dhamija, R.: Hash visualization in user authentication. CHI
'00 Extended Abstracts on Human Factors in Computing Systems. ACM,
The Hague, The Netherlands (2000)
98. Dhondge, K., Choi, B.Y., Song, S., Park, H.: Optical
Wireless authentication for smart devices using an onboard ambient
light sensor. In: 2014 23rd International Conference on Computer
Communication and Networks (ICCCN), pp. 1-8. (2014)
99. Ding, Y., Zhuang, D., Wang, K.: A study of hand vein
recognition method. In: IEEE International Conference Mechatronics
and Automation, 2005, pp. 2106-2110. IEEE, (2005)
100. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic
residues based scheme for authentication and privacy in mobile RFID
systems. Ad Hoc Networks 11, 383-396 (2013)
101. Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A
minimum disclosure approach to authentication and privacy in RFID
systems. Computer Networks 56, 3401-3416 (2012)
102. Drosou, A., Ioannidis, D., Moustakas, K., Tzovaras, D.:
Spatiotemporal analysis of human activities for biometric
authentication. Computer Vision and Image Understanding 116,
411-421 (2012)
103. Drosou, A., Ioannidis, D., Tzovaras, D., Moustakas, K.,
Petrou, M.: Activity related authentication using prehension
biometrics. Pattern Recognition 48, 1743-1759 (2015)
104. Drosou, A., Moustakas, K., Tzovaras, D.: Event-based
unobtrusive authentication using multi-view image sequences.
Proceedings of the first ACM international workshop on Analysis and
retrieval of tracked events and motion in imagery streams. ACM,
Firenze, Italy (2010)
105. Duc, B., Maître, G., Fischer, S., Bigün, J.: Person
authentication by fusing face and speech information. In:
International Conference on Audio-and Video-Based Biometric Person
Authentication, pp. 311-318. Springer, (1997)
106. Dutta, R.: Converting group key agreement protocol into
password-based setting - Case study. Journal of Computers 2, 26-33
(2007)
107. Emam, A.H.M.: Additional authentication and authorization
using registered email-ID for cloud computing. International
Journal of Soft Computing and Engineering 3, 110-113 (2013)
108. English, R., Poet, R.: Towards a metric for
recognition-based graphical password security. Proceedings - 2011
5th International Conference on Network and System Security, NSS
2011 239-243 (2011)
109. Everts, M., Hoepman, J.-H., Siljee, J.: UbiKiMa: ubiquitous
authentication using a smartphone, migrating from passwords to
strong cryptography. Proceedings of the 2013 ACM workshop on
Digital identity management. ACM, Berlin, Germany (2013)
110. Fahmi, P.A., Kodirov, E., Choi, D.-J., Lee, G.-S., Azli,
A.M.F., Sayeed, S.: Implicit authentication based on ear shape
biometrics using smartphone camera during a call. In: 2012 IEEE
International Conference on Systems, Man, and Cybernetics (SMC),
pp. 2272-2276. IEEE, (2012)
111. Failla, P., Sutcu, Y., Barni, M.: eSketch: a
privacy-preserving fuzzy commitment scheme for authentication using
encrypted biometrics. Proceedings of the 12th ACM workshop on
Multimedia and security. ACM, Roma, Italy (2010)
112. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote
authentication scheme with smart cards. Computers & Security
24, 619-628 (2005)
113. Fan, J.W., Chan, C.W., Chang, Y.F.: A random increasing
sequence hash chain and smart card-based remote user authentication
scheme. In: ICICS 2013 - Conference Guide of the 9th International
Conference on Information, Communications and Signal Processing.
(2013)
114. Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y.: An
ultra-lightweight RFID authentication scheme for mobile commerce.
Peer-to-Peer Networking and Applications 1-9 (2016)
115. Fan, R., He, D.-j., Pan, X.-z., Ping, L.-d.: An efficient
and DoS-resistant user authentication scheme for two-tiered
wireless sensor networks. Journal of Zhejiang University SCIENCE C
12, 550-560 (2011)
116. Fan, Y.T., Su, G.P.: Design of two-way one-time-password
authentication scheme based on true random numbers. In: 2nd
International Workshop on Computer Science and Engineering, WCSE
2009, pp. 11-14. (2009)
117. Farash, M.S., Kumari, S., Bakhtiari, M.: Cryptanalysis and
improvement of a robust smart card secured authentication scheme on
SIP using elliptic curve cryptography. Multimedia Tools and
Applications 75, 4485-4504 (2016)
118. Farash, M.S.: Cryptanalysis and improvement of an efficient
mutual authentication RFID scheme based on elliptic curve
cryptography. The Journal of Supercomputing 70, 987-1001 (2014)
119. Flior, E., Kowalski, K.: Continuous biometric user
authentication in online examinations. In: ITNG2010 - 7th
International Conference on Information Technology: New
Generations, pp. 488-492. (2010)
120. Fong, S., Zhuang, Y., Fister, I.: A biometric
authentication model using hand gesture images. BioMedical
Engineering OnLine 12, 1-18 (2013)
121. Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing
resistance with eye-gaze entry in cued-recall graphical passwords.
Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems. ACM, Atlanta, Georgia, USA (2010)
122. Frankel, A.D., Maheswaran, M.: Feasibility of a socially
aware authentication scheme. In: 2009 6th IEEE Consumer
Communications and Networking Conference, CCNC 2009. (2009)
123. Fridman, L., Stolerman, A., Acharya, S., Brennan, P.,
Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision fusion for
continuous authentication. Computers & Electrical Engineering
41, 142-156 (2015)
124. Gafurov, D., Bours, P., Snekkenes, E.: User authentication
based on foot motion. Signal, Image and Video Processing 5, 457-467
(2011)
125. Giot, R., El-Abed, M., Hemery, B., Rosenberger, C.:
Unconstrained keystroke dynamics authentication with shared secret.
Computers & Security 30, 427-445 (2011)
126. Gnanaraj, J.W.K., Ezra, K., Rajsingh, E.B.: Smart card
based time efficient authentication scheme for global grid
computing. Human-centric Computing and Information Sciences 3, 1-14
(2013)
127. Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to
better authentication. CHI '02 Extended Abstracts on Human Factors
in Computing Systems. ACM, Minneapolis, Minnesota, USA (2002)
128. Gong, L., Pan, J., Liu, B., Zhao, S.: A novel one-time
password mutual authentication scheme on sharing renewed finite
random sub-passwords. Journal of Computer and System Sciences 79,
122-130 (2013)
129. Gope, P., Hwang, T.: An efficient mutual authentication and
key agreement scheme preserving strong anonymity of the mobile user
in global mobility networks. Journal of Network and Computer
Applications 62, 1-8 (2016)
130. Gope, P., Hwang, T.: Enhanced Secure Mutual Authentication
and Key Agreement Scheme Preserving User Anonymity in Global Mobile
Networks. Wireless Personal Communications 82, 2231-2245 (2015)
131. Goutham, R.A., Kim, D.S., Yoo, K.Y.: Implicit graphical
password mutual authentication using mirror-image encryption. In:
Proceedings of the 2014 Research in Adaptive and Convergent
Systems, RACS 2014, pp. 218-223. (2014)
132. Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous
ID-based remote mutual authentication with key agreement protocol
on ECC using smart cards. Proceedings of the 30th Annual ACM
Symposium on Applied Computing. ACM, Salamanca, Spain (2015)
133. Grover, J., Hanmandlu, M.: Hybrid fusion of score level and
adaptive fuzzy decision level fusions for the finger-knuckle-print
based authentication. Applied Soft Computing Journal 31, 1-13
(2015)
134. Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de
Santos Sierra, A.: Authentication in mobile devices through hand
gesture recognition. International Journal of Information Security
11, 65-83 (2012)
135. Gugenheimer, J., Luca, A.D., Hess, H., Karg, S., Wolf, D.,
Rukzio, E.: ColorSnakes: Using Colored Decoys to Secure
Authentication in Sensitive Contexts. Proceedings of the 17th
International Conference on Human-Computer Interaction with Mobile
Devices and Services. ACM, Copenhagen, Denmark (2015)
136. Gugenheimer, J., Schaub, F., Neiswander, G.M., Guneratne,
E., Weber, M.: User Authentication for Rotary Knob Controlled
In-car Applications. Proceedings of the 6th International
Conference on Automotive User Interfaces and Interactive Vehicular
Applications. ACM, Seattle, WA, USA (2014)
137. Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: An Improved
Biometrics-Based Authentication Scheme for Telecare Medical
Information Systems. Journal of Medical Systems 39, 1-10 (2015)
138. Gupta, P., Gupta, P.: Multi-modal fusion of palm-dorsa vein
pattern for accurate personal authentication. Knowledge-Based
Systems 81, 117-130 (2015)
139. Gupta, P., Srivastava, S., Gupta, P.: An accurate infrared
hand geometry and vein pattern based authentication system.
Knowledge-Based Systems 103, 143-155 (2016)
140. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N.,
Fu, H.: MAPS: A Multi-Dimensional Password Scheme for Mobile
Authentication. Proceedings of the 2015 International Conference on
Interactive Tabletops & Surfaces. ACM, Madeira, Portugal
(2015)
141. Gurav, S.M., Gawade, L.S., Rane, P.K., Khochare, N.R.:
Graphical password authentication: Cloud securing scheme. In:
Proceedings - International Conference on Electronic Systems,
Signal Processing, and Computing Technologies, ICESC 2014, pp.
479-483. (2014)
142. Gurung, B., Prasad, P.W.C., Alsadoon, A., Elchouemi, A.:
Enhanced Virtual Password Authentication Scheme Resistant to
Shoulder Surfing. In: 2015 Second International Conference on Soft
Computing and Machine Intelligence (ISCMI), pp. 134-139. (2015)
143. Gy, odor, Szendi, t., Imre, n.: Elliptic curve cryptography
based authentication protocol for small computational capacity RFID
systems. Proceedings of the 6th ACM workshop on QoS and security
for wireless and mobile networks. ACM, Bodrum, Turkey (2010)
144. Habib, K., Torjusen, A., Leister, W.: A novel
authentication framework based on bio-metric and radio
fingerprinting for the IoT in eHealth. In: Proceedings of
International Conference on Smart Systems, Devices and Technologies
(SMART), pp. 32-37. (2014)
145. Hafizul Islam, S.K., Biswas, G.P.: Design of improved
password authentication and update scheme based on elliptic curve
cryptography. Mathematical and Computer Modelling 57, 2703-2717
(2013)
146. Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a
security token for unified authentication. In: 2007 Second
International Conference on Systems and Networks Communications
(ICSNC 2007), pp. 68-68. IEEE, (2007)
147. Hammouri, G., Öztürk, E., Sunar, B.: A tamper-proof and
lightweight authentication scheme. Pervasive and Mobile Computing
4, 807-818 (2008)
148. Hang, A., Luca, A.D., Hussmann, H.: I Know What You Did
Last Week! Do You?: Dynamic Security Questions for Fallback
Authentication on Smartphones. Proceedings of the 33rd Annual ACM
Conference on Human Factors in Computing Systems. ACM, Seoul,
Republic of Korea (2015)
149. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A Chaotic
Map-based Authentication Scheme for Telecare Medicine Information
Systems. Journal of Medical Systems 37, 1-7 (2013)
150. Hart, J., Markantonakis, K., Mayes, K.: Website credential
storage and two-factor web authentication with a Java SIM. Lecture
Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), vol.
6033 LNCS, pp. 229-236 (2010)
151. He, D., Chen, J., Chen, Y.: A secure mutual authentication
scheme for session initiation protocol using elliptic curve
cryptography. Security and Communication Networks 5, 1423-1429
(2012)
152. He, D., Kumar, N., Chilamkurti, N.: A secure
temporal-credential-based mutual authentication and key agreement
scheme with pseudo identity for wireless sensor networks.
Information Sciences 321, 263-277 (2015)
153. He, D., Wang, D.: Robust Biometrics-Based Authentication
Scheme for Multiserver Environment. IEEE Systems Journal 9, 816-823
(2015)
154. Herzberg, A., Margulies, R.: My authentication album:
Adaptive images-based login mechanism. In: IFIP International
Information Security Conference, pp. 315-326. Springer, (2012)
155. Hintze, D., Findling, R.D., Muaaz, M., Koch, E., Ren,
Mayrhofer: Cormorant: towards continuous risk-aware multi-modal
cross-device authentication. Adjunct Proceedings of the 2015 ACM
International Joint Conference on Pervasive and Ubiquitous
Computing and Proceedings of the 2015 ACM International Symposium
on Wearable Computers. ACM, Osaka, Japan (2015)
156. Hoang, T., Choi, D., Nguyen, T.: Gait authentication on
mobile phone using biometric cryptosystem and fuzzy commitment
scheme. International Journal of Information Security 14, 549-560
(2015)
157. Hocquet, S., Ramel, J.-Y., Cardot, H.: Fusion of methods
for keystroke dynamic authentication. In: Fourth IEEE Workshop on
Automatic Identification Advanced Technologies (AutoID'05), pp.
224-229. IEEE, (2005)
158. Hong, F., Wei, M., You, S., Feng, Y., Guo, Z.: Waving
Authentication: Your Smartphone Authenticate You on Motion Gesture.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on
Human Factors in Computing Systems. ACM, Seoul, Republic of Korea
(2015)
159. Hong, S.: Two-channel user authentication by using USB on
Cloud. Journal of Computer Virology and Hacking Techniques 1-7
(2015)
160. Hsieh, C.-Y., Lin, W.-Y.: Video-based human action and hand
gesture recognition by fusing factored matrices of dual tensors.
Multimedia Tools and Applications 1-20 (2016)
161. Hsieh, W.B., Leu, J.S.: Design of a time and location based
One-Time Password authentication scheme. In: IWCMC 2011 - 7th
International Wireless Communications and Mobile Computing
Conference, pp. 201-206. (2011)
162. Hu, L.-l., Niu, X.-x., Yang, Y.-x.: Weaknesses and
improvements of a remote user authentication scheme using smart
cards. The Journal of China Universities of Posts and
Telecommunications 14, 91-94 (2007)
163. Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein
authentication based on wide line detector and pattern
normalization. In: International Conference on Pattern Recognition
(ICPR), 2010 20th, pp. 1269-1272. IEEE, (2010)
164. Huang, H.F., Chang, H.W., Yu, P.K.: Enhancement of
timestamp-based user authentication scheme with smart card.
International Journal of Network Security 16, 463-467 (2014)
165. Huang, Y., Huang, Z., Zhao, H., Lai, X.: A new One-time
Password Method. IERI Procedia 4, 32-37 (2013)
166. Huang, Y.L., Lu, P.H., Tygar, J.D., Joseph, A.D.: OSNP:
Secure wireless authentication protocol using one-time key.
Computers & Security 28, 803-815 (2009)
167. Hussain, A., Bhuiyan, A., Mian, A., Ramamohanarao, K.:
Biometric Security Application for Person Authentication Using
Retinal Vessel Feature. In: International Conference on Digital
Image Computing: Techniques and Applications (DICTA), 2013, pp.
1-8. (2013)
168. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunic's
password authentication schemes. IEICE Transactions on
Communications E85-B, 823-825 (2002)
169. Hwang, M.-S., Li, L.-H.: A new remote user authentication
scheme using smart cards. IEEE Transactions on Consumer Electronics
46, 28-30 (2000)
170. Hwang, M.-S.: A remote password authentication scheme based
on the digital signature method. International Journal of Computer
Mathematics 70, 657-666 (1999)
171. Hwang, S.-s., Cho, S., Park, S.: Keystroke dynamics-based
authentication for mobile devices. Computers & Security 28,
85-93 (2009)
172. Hwang, S.-s., Lee, H.-j., Cho, S.: Improving authentication
accuracy using artificial rhythms and cues for keystroke
dynamics-based authentication. Expert Systems with Applications 36,
10649-10656 (2009)
173. Imtiaz, H., Fattah, S.A.: A face recognition scheme using
wavelet-based local features. In: Computers & Informatics
(ISCI), 2011 IEEE Symposium on, pp. 313-316. (2011)
174. Imtiaz, H., Fattah, S.A.: A wavelet-domain local feature
selection scheme for face recognition. In: International Conference
on Communications and Signal Processing (ICCSP), 2011, pp. 448-451.
(2011)
175. Islam, M., Hasan, M.M., Farhad, M.M., Tanni, T.R.: Human
authentication process using finger knuckle surface with artificial
Neural Networks based on a hybrid feature selection method. In:
Proceeding of the 15th International Conference on Computer and
Information Technology, ICCIT 2012, pp. 61-64. (2012)
176. Islam, M.S.: Heartbeat biometrics for remote authentication
using sensor embedded computing devices. International Journal of
Distributed Sensor Networks 2015, (2015)
177. Islam, S.K.H., Biswas, G.P.: Improved remote login scheme
based on ECC. In: International Conference on Recent Trends in
Information Technology (ICRTIT), 2011, pp. 1221-1226. (2011)
178. Islam, S.K.H., Khan, M.K., Obaidat, M.S., Muhaya, F.T.B.:
Provably Secure and Anonymous Password Authentication Protocol for
Roaming Service in Global Mobility Networks Using Extended Chaotic
Maps. Wireless Personal Communications 84, 2013-2034 (2015)
179. Jagadiswary, D., Saraswady, D.: Biometric Authentication
Using Fused Multimodal Biometric. Procedia Computer Science 85,
109-116 (2016)
180. Jain, A., Hong, L., Kulkarni, Y.: A multimodal biometric
system using fingerprint, face and speech. In: Proceedings of 2nd
Int'l Conference on Audio-and Video-based Biometric Person
Authentication, Washington DC, pp. 182-187. (1999)
181. Jain, A., Kanhangad, V.: Exploring orientation and
accelerometer sensor data for personal authentication in
smartphones using touchscreen gestures. Pattern Recognition Letters
68, Part 2, 351-360 (2015)
182. Jakobsson, M., Yang, L., Wetzel, S.: Quantifying the
security of preference-based authentication. Proceedings of the 4th
ACM workshop on Digital identity management. ACM, Alexandria,
Virginia, USA (2008)
183. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B.,
Amirtharajan, R.: Graphical password authentication scheme for
embedded platform. Journal of Artificial Intelligence 7, 161-171
(2014)
184. Jeon, W., Lee, Y., Won, D.: An efficient user
authentication scheme with smart cards for wireless communications.
International Journal of Security and its Applications 7, 1-16
(2013)
185. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user
authentication scheme using smart cards in home networks. In:
Hawaii International Conference on System Sciences, Proceedings of
the 41st Annual, pp. 294-294. IEEE, (2008)
186. Jiang, L., Li, X., Cheng, L.L., Guo, D.: Identity
authentication scheme of cloud storage for user anonymity via USB
token. In: Proceedings of the International Conference on
Anti-Counterfeiting, Security and Identification, ASID. (2013)
187. Jiang, P., Wen, Q., Li, W., Jin, Z., Zhang, H.: An
anonymous and efficient remote biometrics user authentication
scheme in a multi server environment. Frontiers of Computer Science
9, 142-156 (2015)
188. Jiang, Q., Li, G.S., Ma, J.F.: Security flaws and
improvement of an ID-based wireless authentication scheme with
anonymity. Tongxin Xuebao/Journal on Communications 31, 209-216
(2010)
189. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced
authentication scheme with privacy preservation for roaming service
in global mobility networks. Wireless Personal Communications 68,
1477-1491 (2013)
190. Jiang, Q., Ma, J., Ma, Z., Li, G.: A Privacy Enhanced
Authentication Scheme for Telecare Medical Information Systems.
Journal of Medical Systems 37, 1-8 (2013)
191. Jin, Z., Teoh, A.B.J., Thian, S.O., Tee, C.: Typing
dynamics biometric authentication through fuzzy logic. In:
Proceedings - International Symposium on Information Technology
2008, ITSim. (2008)
192. Jo, J., Kim, Y., Lee, S.: Mindmetrics: Identifying users
without their login IDs. In: 2014 IEEE International Conference on
Systems, Man, and Cybernetics (SMC), pp. 2121-2126. (2014)
193. Joshi, S.S., Phoha, V.V.: Competition between SOM clusters
to model user authentication system in computer networks. In:
Proceedings of the 2007 2nd International Conference on
Communication System Software and Middleware and Workshops,
COMSWARE 2007. (2007)
194. Joyce, R., Gupta, G.: Identity authentication based on
keystroke latencies. Commun. ACM 33, 168-176 (1990)
195. Kambourakis, G., Damopoulos, D., Papamartzivanos, D.,
Pavlidakis, E.: Introducing touchstroke: keystroke‐based
authentication system for smartphones. Security and Communication
Networks (2014)
196. Kang, B.J., Park, K.R.: A new multi-unit iris
authentication based on quality assessment and score level fusion
for mobile phones. Machine Vision and Applications 21, 541-553
(2010)
197. Kang, P., Cho, S.: Keystroke dynamics-based user
authentication using long and free text strings from various input
devices. Information Sciences 308, 72-93 (2015)
198. Karuppiah, M., Saravanan, R.: A Secure Authentication
Scheme with User Anonymity for Roaming Service in Global Mobility
Networks. Wireless Personal Communications 84, 2055-2078 (2015)
199. Khakzar, M., Pourghassem, H.: Human authentication
algorithm using spectral feature of retinal fundus image.
International Journal of Tomography and Simulation 28, 23-38
(2015)
200. Khamis, M., Alt, F., Hassib, M., Zezschwitz, E.v.,
Hasholzner, R., Bulling, A.: GazeTouchPass: Multimodal
Authentication Using Gaze and Touch on Mobile Devices. Proceedings
of the 2016 CHI Conference Extended Abstracts on Human Factors in
Computing Systems. ACM, Santa Clara, California, USA (2016)
201. Khan, G.N., Moessner, M.: Low-cost authentication protocol
for passive, computation capable RFID tags. Wireless Networks 21,
565-580 (2015)
202. Khan, M.K., Alghathbar, K., Zhang, J.: Privacy-preserving
and tokenless chaotic revocable face authentication scheme.
Telecommunication Systems 47, 227-234 (2011)
203. Khot, R.A., Srinathan, K., Khot, R.A.: NAPTune: fine tuning
graphical authentication. Proceedings of the 3rd International
Conference on Human Computer Interaction. ACM, Bangalore, India
(2011)
204. Khot, R.A., Srinathan, K., Kumaraguru, P.: MARASIM: a novel
jigsaw based authentication scheme using tagging. Proceedings of
the SIGCHI Conference on Human Factors in Computing Systems. ACM,
Vancouver, BC, Canada (2011)
205. Khoury, E., El Shafey, L., McCool, C., Günther, M., Marcel,
S.: Bi-modal biometric authentication on mobile phones in
challenging conditions. Image and Vision Computing 32, 1147-1160
(2014)
206. Kikuchi, H., Nagai, K., Ogata, W., Nishigaki, M.:
Privacy-preserving similarity evaluation and application to remote
biometrics authentication. Soft Computing 14, 529-536 (2010)
207. Kim, S.K., Chung, M.G.: More secure remote user
authentication scheme. Computer Communications 32, 1018-1021
(2009)
208. Kotropoulos, C., Tefas, A., Pitas, I.: Frontal face
authentication using morphological elastic graph matching. IEEE
Transactions on Image Processing 9, 555-560 (2000)
209. Kratz, S., Aumi, M.T.I.: AirAuth: a biometric
authentication system using in-air hand gestures. CHI '14 Extended
Abstracts on Human Factors in Computing Systems. ACM, Toronto,
Ontario, Canada (2014)
210. Krause, M.: A behavioral biometrics based authentication
method for MOOC's that is robust against imitation attempts.
Proceedings of the first ACM conference on Learning @ scale
conference. ACM, Atlanta, Georgia, USA (2014)
211. Kuber, R., Sharma, S.: Toward tactile authentication for
blind users. Proceedings of the 12th international ACM SIGACCESS
conference on Computers and accessibility. ACM, Orlando, Florida,
USA (2010)
212. Kuber, R., Yu, W.: Feasibility study of tactile-based
authentication. International Journal of Human-Computer Studies 68,
158-181 (2010)
213. Kulkarni, S., Raut, R.D., Dakhole, P.K.: A Novel
Authentication System Based on Hidden Biometric Trait. Procedia
Computer Science 85, 255-262 (2016)
214. Kulkarni, S., Raut, R.D., Dakhole, P.K.: Wavelet Based
Modern Finger Knuckle Authentication. Procedia Computer Science 70,
649-657 (2015)
215. Kumar, A., Garg, S., Hanmandlu, M.: Biometric
authentication using finger nail plates. Expert Systems with
Applications 41, 373-386 (2014)
216. Kumar, A., Zhang, D.: Integrating palmprint with face for
user authentication. In: Workshop on Multimodal User Authentication
(MMUA 2003), pp. 107-112. Citeseer, (2003)
217. Kumar, A., Zhang, D.: Personal recognition using hand shape
and texture. IEEE Transactions on Image Processing 15, 2454-2461
(2006)
218. Kumar, M.: New remote user authentication scheme using
smart cards. IEEE Transactions on Consumer Electronics 50, 597-600
(2004)
219. Kumar, N., Kaur, K., Misra, S.C., Iqbal, R.: An intelligent
RFID-enabled authentication scheme for healthcare applications in
vehicular mobile cloud. Peer-to-Peer Networking and Applications
1-17 (2015)
220. Kumar, T.R., Raghavan, S.: PassPattern System (PPS): a
pattern-based user authentication scheme. In: International
Conference on Research in Networking, pp. 162-169. Springer,
(2008)
221. Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S.,
Khan, M.K.: An improved smart card based authentication scheme for
session initiation protocol. Peer-to-Peer Networking and
Applications 1-14 (2015)
222. Kumari, S., Gupta, M.K., Kumar, M.: Cryptanalysis and
security enhancement of Chen et al.’s remote user authentication
scheme using smart card. Central European Journal of Computer
Science 2, 60-75 (2012)
223. Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user
anonymous password authentication scheme without smart card.
International Journal of Communication Systems 29, 441-458
(2016)
224. Kumari, S., Om, H.: A modified remote authentication method
with smartcards and check digits. In: Proceedings - 2014
International Conference on Data Science and Engineering, ICDSE
2014, pp. 206-209. (2014)
225. Kuribara, T., Shizuki, B., Tanaka, J.: Vibrainput: two-step
PIN entry system based on vibration and visual information. CHI '14
Extended Abstracts on Human Factors in Computing Systems. ACM,
Toronto, Ontario, Canada (2014)
226. Kwon, T., Hong, J.: Analysis and Improvement of a PIN-Entry
Method Resilient to Shoulder-Surfing and Recording Attacks. IEEE
Transactions on Information Forensics and Security 10, 278-292
(2015)
227. Lamport, L.: Password authentication with insecure
communication. Communications of the ACM 24, 770-772 (1981)
228. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement
on a new authentication scheme with anonymity for wireless
environments. IEEE Transactions on Industrial Electronics 53,
1683-1687 (2006)
229. Lee, C.-C., Hwang, M.-S., Yang, W.-P.: A flexible remote
user authentication scheme using smart cards. SIGOPS Oper. Syst.
Rev. 36, 46-52 (2002)
230. Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user
authentication scheme using hash functions. SIGOPS Oper. Syst. Rev.
36, 23-29 (2002)
231. Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID
based remote user authentication scheme for multi-server
environment using smart cards. Expert Systems with Applications 38,
13863-13870 (2011)
232. Lee, C.-Y., Lin, C.-H., Chang, C.-C.: An improved low
computation cost user authentication scheme for mobile
communication. In: 19th International Conference on Advanced
Information Networking and Applications (AINA'05) Volume 1 (AINA
papers), pp. 249-252. IEEE, (2005)
233. Lee, G., Jun-bin, C.A.O., Haitao, Y., Lili, D.:
International Conference on Solid State Devices and Materials
Science, April 1-2, 2012, MacaoEyebrows Identity Authentication
Based on Wavelet Transform and Support Vector Machines. Physics
Procedia 25, 1337-1341 (2012)
234. Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme
for site authentication. In: Lecture Notes in Computer Science, pp.
111-116. (2005)
235. Lee, J., Park, H., Bang, G., Song, J.: POSTER: A
Password-based Authentication by Splitting Roles of User Interface.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and
Communications Security. ACM, Denver, Colorado, USA (2015)
236. Lee, N.Y., Chiu, Y.C.: Improved remote authentication
scheme with smart card. Computer Standards and Interfaces 27,
177-180 (2005)
237. Lee, S., Asano, T., Kim, K.: RFID mutual authentication
scheme based on synchronized secret information. In: Symposium on
cryptography and information security. (2006)
238. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improved efficient
remote user authentication scheme using smart cards. IEEE
Transactions on Consumer Electronics 50, 565-567 (2004)
239. Lee, T.-F.: An Efficient Chaotic Maps-Based Authentication
and Key Agreement Scheme Using Smartcards for Telecare Medicine
Information Systems. Journal of Medical Systems 37, 1-9 (2013)
240. Lee, Y., Chung, Y., Moon, K.: Secure face authentication
framework in open networks. ETRI Journal 32, 950-960 (2010)
241. Lee, Y., Kim, J., Jeon, W., Won, D.: Design of a simple
user authentication scheme using QR-code for mobile device.
Information Technology Convergence, Secure and Trust Computing, and
Data Management, pp. 241-247. Springer (2012)
242. Lee, Y.S., Kim, E., Jung, M.S.: A smart card based user
authentication scheme for multi-server environment. In: Proceedings
of the 5th International Conference on Ubiquitous Information
Management and Communication, ICUIMC 2011. (2011)
243. Leea, W.B., Chen, T.H., Sun, W.R., Ho, K.I.J.: An
S/Key-like one-time password authentication scheme using smart
cards for smart meter. In: Proceedings - 2014 IEEE 28th
International Conference on Advanced Information Networking and
Applications Workshops, IEEE WAINA 2014, pp. 281-286. (2014)
244. Leftheriotis, I.: User authentication in a multi-touch
surface: a chord password system. CHI '13 Extended Abstracts on
Human Factors in Computing Systems. ACM, Paris, France (2013)
245. Leicher, A., Schmidt, A.U., Shah, Y.: Smart OpenID: a smart
card based OpenID protocol. In: IFIP International Information
Security Conference, pp. 75-86. Springer, (2012)
246. León-Coca, J.M., Reina, D.G., Toral, S.L., Barrero, F.,
Bessis, N.: Authentication Systems Using ID Cards over NFC Links:
The Spanish Experience Using DNIe. Procedia Computer Science 21,
91-98 (2013)
247. Li, C.-T., Lee, C.-C.: A novel user authentication and
privacy preserving scheme with smart cards for wireless
communications. Mathematical and Computer Modelling 55, 35-44
(2012)
248. Li, D., Sang, L., Yang, Y., Wu, Z.: Bimodal speaker
identification using dynamic bayesian network. Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), vol. 3338, pp.
577-585 (2004)
249. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active
authentication for mobile devices utilising behaviour profiling.
International Journal of Information Security 13, 229-244
(2014)
250. Li, F., Wechsler, H.: Face authentication using
recognition-by-parts, boosting and transduction. International
Journal of Pattern Recognition and Artificial Intelligence 23,
545-573 (2009)
251. Li, L., Zhao, X., Xue, G.: Unobservable Re-authentication
for Smartphones. In: NDSS. (2013)
252. Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password
authentication scheme for multiserver architecture using neural
networks. IEEE Transactions on Neural Networks 12, 1498-1504
(2001)
253. Li, X., Liao, J., Kumari, S., Liang, W., Wu, F., Khan,
M.K.: A New Dynamic ID-Based User Authentication Scheme Using
Mobile Device: Cryptanalysis, the Principles and Design. Wireless
Personal Communications 85, 263-288 (2015)
254. Li, X., Niu, J., Khan, M.K., Liao, J.: Security Analysis
and Enhancement of a Dynamic Identity Based Authentication Scheme
Using Smart Cards. In: Biometrics and Security Technologies
(ISBAST), 2013 International Symposium on, pp. 149-154. (2013)
255. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W.: An
enhancement of a smart card authentication scheme for multi-server
architecture. Wireless Personal Communications 80, 175-192
(2015)
256. Li, X., Niu, J., Liu, Y., Liao, J., Liang, W.: Robust
dynamic ID-based remote user authentication scheme using smart
cards. International Journal of Ad Hoc and Ubiquitous Computing 17,
254-264 (2014)
257. Li, X., Wang, K., Shen, J., Kumari, S., Wu, F., Hu, Y.: An
enhanced biometrics-based user authentication scheme for
multi-server environments in critical systems. Journal of Ambient
Intelligence and Humanized Computing 7, 427-443 (2016)
258. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: Secure
privacy-preserving biometric authentication scheme for telecare
medicine information systems. Journal of medical systems 38, 1-8
(2014)
259. Li, X., Wen, Q., Zhang, H., Jin, Z.: An improved
authentication with key agreement scheme on elliptic curve
cryptosystem for global mobility networks. International Journal of
Network Management 23, 311-324 (2013)
260. Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: A secure
image-based authentication scheme for mobile devices. In: Lecture
Notes in Computer Science, pp. 751-760. (2005)
261. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password
authentication scheme over insecure networks. Journal of Computer
and System Sciences 72, 727-740 (2006)
262. Liao, Y.-P., Hsiao, C.-M.: A secure ECC-based RFID
authentication scheme integrated with ID-verifier transfer
protocol. Ad Hoc Networks 18, 133-146 (2014)
263. Liao, Y.P., Hsiao, C.M.: A Secure ECC-Based RFID
Authentication Scheme Using Hybrid Protocols. Smart Innovation,
Systems and Technologies, vol. 21, pp. 1-13 (2013)
264. Liaw, H.-T., Fan, S.-W., Wu, W.-C.: A simple password
authentication using a polynomial. SIGOPS Oper. Syst. Rev. 38,
74-79 (2004)
265. Lin, C.-L., Hwang, T.: A password authentication scheme
with secure password updating. Computers & Security 22, 68-72
(2003)
266. Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new
strong-password authentication scheme using one-way hash functions.
Journal of Computer and Systems Sciences International 45, 623-626
(2006)
267. Lin, I.-C., Chang, C.-C.: A countable and time-bound
password-based user authentication scheme for the applications of
electronic commerce. Information Sciences 179, 1269-1277 (2009)
268. Lin, M.-H., Chang, C.-C.: A secure one-time password
authentication scheme with low-computation for mobile
communications. SIGOPS Oper. Syst. Rev. 38, 76-84 (2004)
269. Lin, T.H., Shih, W.P., Chen, W.C., Ho, W.Y.: 3D face
authentication by mutual coupled 3D and 2D feature extraction.
Proceedings of the 44th annual Southeast regional conference. ACM,
Melbourne, Florida (2006)
270. Liou, J.C., Conway, J.: A single-factor dynamic
authentication for computer systems with touch screens. In: 23rd
International Conference on Software Engineering and Data
Engineering, SEDE 2014, pp. 31-36. (2014)
271. Liu, J., Yu, F.R., Lung, C.H., Tang, H.: Optimal combined
intrusion detection and biometric-based continuous authentication
in high security mobile ad hoc networks. IEEE Transactions on
Wireless Communications 8, 806-815 (2009)
272. Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User
evaluation of lightweight user authentication with a single
tri-axis accelerometer. Proceedings of the 11th International
Conference on Human-Computer Interaction with Mobile Devices and
Services. ACM, Bonn, Germany (2009)
273. Liu, J.Y., Zhou, A.M., Gao, M.X.: A new mutual
authentication scheme based on nonce and smart cards. Computer
Communications 31, 2205-2209 (2008)
274. Lo, N., Tsai, J.: An Efficient Conditional
Privacy-Preserving Authentication Scheme for Vehicular Sensor
Networks Without Pairings. IEEE Transactions on Intelligent
Transportation Systems (2015)
275. Lo, N.-W., Yeh, K.-H.: An efficient mutual authentication
scheme for EPCglobal class-1 generation-2 RFID system. In:
International Conference on Embedded and Ubiquitous Computing, pp.
43-56. Springer, (2007)
276. Lo, N.W., Yeh, K.H.: Mutual RFID authentication scheme for
resource-constrained tags. Journal of Information Science and
Engineering 26, 1875-1889 (2010)
277. Lopez, N., Rodriguez, M., Fellegi, C., Long, D., Schwarz,
T.: Even or Odd: A Simple Graphical Authentication System. IEEE
Latin America Transactions 13, 804-809 (2015)
278. Loutrel, M., Urien, P., Gaïti, D.: Authentication in
wireless networks: state of the art and integration with smart
card. Annales des Télécommunications 59, 130-148 (2004)
279. Lu, Y., Wu, X., Yang, X.: A secure anonymous authentication
scheme for wireless communications using smart cards. International
Journal of Network Security 17, 237-245 (2015)
280. Luca, A.D., Harbach, M., Zezschwitz, E.v., Maurer, M.-E.,
Slawik, B.E., Hussmann, H., Smith, M.: Now you see me, now you
don't: protecting smartphone authentication from shoulder surfers.
Proceedings of the 32nd annual ACM conference on Human factors in
computing systems. ACM, Toronto, Ontario, Canada (2014)
281. Luca, A.D., Weiss, R., Hu, H., mann, An, X.: Eyepass -
eye-stroke authentication for public terminals. CHI '08 Extended
Abstracts on Human Factors in Computing Systems. ACM, Florence,
Italy (2008)
282. Luca, A.D., Zezschwitz, E.v., Hu, H., mann: Vibrapass:
secure authentication based on shared lies. Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems. ACM,
Boston, MA, USA (2009)
283. Luca, A.D., Zezschwitz, E.v., Nguyen, N.D.H., Maurer,
M.-E., Rubegni, E., Scipioni, M.P., Langheinrich, M.:
Back-of-device authentication on smartphones. Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems. ACM,
Paris, France (2013)
284. Lumini, A., Nanni, L.: An advanced multi-modal method for
human authentication featuring biometrics data and tokenised random
numbers. Neurocomputing 69, 1706-1710 (2006)
285. Maio, D., Nanni, L.: Multihashing, human authentication
featuring biometrics data and tokenized random number: A case study
FVC2004. Neurocomputing 69, 242-249 (2005)
286. Maiorana, E., Campisi, P., Gonz, N., lez, C., Neri, A.:
Keystroke dynamics authentication for mobile phones. Proceedings of
the 2011 ACM Symposium on Applied Computing. ACM, TaiChung, Taiwan
(2011)
287. Malempati, S., Mogalla, S.: Intrusion prevention by native
language password authentication scheme. Communications in Computer
and Information Science, vol. 196 CCIS, pp. 239-248 (2011)
288. Manasa, N.L., Govardhan, A., Satyanarayana, C.H.: Fusion of
multiple biometric traits: Fingerprint, palmprint and iris.
Intelligent Systems Reference Library, vol. 70, pp. 287-320
(2014)
289. Mandalapu, A., Daffney Deepa, V., Raj, L.D., Anish Dev, J.:
An NFC featured three level authentication system for tenable
transaction and abridgment of ATM card blocking intricacies. In:
Computing and Communication (IEMCON), 2015 International Conference
and Workshop on, pp. 1-6. (2015)
290. Maqsood, S., Chiasson, S., Girouard, A.: POSTER: Passwords
on flexible display devices. Proceedings of the 2013 ACM SIGSAC
conference on Computer & communications security. ACM, Berlin,
Germany (2013)
291. Marcel, S., Millán, J.d.R.: Person authentication using
brainwaves (EEG) and maximum a posteriori model adaptation. IEEE
transactions on pattern analysis and machine intelligence 29,
743-752 (2007)
292. Martínez-Peláez, R., Rico-Novella, F., Forné, J.,
Velarde-Alvarado, P.: Security Improvement of Two Dynamic ID-based
Authentication Schemes by Sood-Sarje-Singh. Journal of Applied
Research and Technology 11, 755-763 (2013)
293. Matsuyama, Y., Shozawa, M., Yokote, R.: Brain signal׳s
low-frequency fits the continuous authentication. Neurocomputing
164, 137-143 (2015)
294. Medikonda, J., Madasu, H., B.K, P.: Information set based
gait authentication system. Neurocomputing
295. Meng, Y., Wong, D.S., Kwok, L.-F.: Design of touch dynamics
based user authentication with an adaptive mechanism on mobile
phones. Proceedings of the 29th Annual ACM Symposium on Applied
Computing. ACM, Gyeongju, Republic of Korea (2014)
296. Meng, Y., Wong, D.S., Schlegel, R.: Touch gestures based
biometric authentication scheme for touchscreen mobile phones. In:
International Conference on Information Security and Cryptology,
pp. 331-350. Springer, (2012)
297. Meng, Y.: Designing click-draw based graphical password
scheme for better authentication. In: Proceedings - 2012 IEEE 7th
International Conference on Networking, Architecture and Storage,
NAS 2012, pp. 39-48. (2012)
298. Mihajlov, M., Jerman-Blažič, B.: On designing usable and
secure recognition-based graphical authentication mechanisms.
Interacting with Computers 23, 582-593 (2011)
299. Mir, O., Munilla, J., Kumari, S.: Efficient anonymous
authentication with key agreement protocol for wireless medical
sensor networks. Peer-to-Peer Networking and Applications 1-13
(2015)
300. Mir, O., Nikooghadam, M.: A Secure Biometrics Based
Authentication with Key Agreement Scheme in Telemedicine Networks
for E-Health Services. Wireless Personal Communications 83,
2439-2461 (2015)
301. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure and
efficient ECC-based user anonymity-preserving session initiation
authentication protocol using smart card. Peer-to-Peer Networking
and Applications 9, 171-192 (2016)
302. Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S.,
Khan, M.K.: Cryptanalysis and Improvement of Yan et al.’s
Biometric-Based Authentication Scheme for Telecare Medicine
Information Systems. Journal of Medical Systems 38, 1-12 (2014)
303. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K.,
Chaturvedi, A.: Security Enhancement of a Biometric based
Authentication Scheme for Telecare Medicine Information Systems
with Nonce. Journal of Medical Systems 38, 1-11 (2014)
304. Mishra, D.: Design and Analysis of a Provably Secure
Multi-server Authentication Scheme. Wireless Personal
Communications 86, 1095-1119 (2016)
305. Mishra, R., Barnwal, A.K.: A Privacy Preserving Secure and
Efficient Authentication Scheme for Telecare Medical Information
Systems. Journal of Medical Systems 39, 1-10 (2015)
306. Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time
continuous iris recognition for authentication using an eye
tracker. Proceedings of the 2012 ACM conference on Computer and
communications security. ACM, Raleigh, North Carolina, USA
(2012)
307. Mock, P., Edelmann, r., Schilling, A., Rosenstiel, W.: User
identification using raw sensor data from typing on interactive
displays. Proceedings of the 19th international conference on
Intelligent User Interfaces. ACM, Haifa, Israel (2014)
308. Mondal, A., Roy, K., Bhattacharya, P.: Secure and
simplified access to home appliances using Iris recognition. In:
Computational Intelligence in Biometrics: Theory, Algorithms, and
Applications, 2009. CIB 2009. IEEE Workshop on, pp. 22-29.
(2009)
309. Monrose, F., Rubin, A.: Authentication via keystroke
dynamics. In: Proceedings of the 4th ACM conference on Computer and
communications security, pp. 48-56. ACM, (1997)
310. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric
for authentication. Future Generation computer systems 16, 351-359
(2000)
311. Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An
Elliptic Curve-based Mutual Authentication Scheme for RFID Implant
Systems. Procedia Computer Science 32, 198-206 (2014)
312. Mudholkar, S.S., Shende, P.M., Sarode, M.V.: Biometrics
authentication technique for intrusion detection systems using
fingerprint recognition. International Journal of Computer Science,
Engineering and Information Technology 2, 57-65 (2012)
313. Nader, J., Alsadoon, A., Prasad, P.W.C., Singh, A.K.,
Elchouemi, A.: Designing Touch-Based Hybrid Authentication Method
for Smartphones. Procedia Computer Science 70, 198-204 (2015)
314. Nakakuni, M., Dozono, H., Tokushima, H., Noguchi, Y.:
Application of self organizing maps for the integrated
authentication using keystroke timings and handwritten symbols.
WSEAS Transactions on Information Science and Applications 4,
413-420 (2007)
315. Nam, J., Choo, K.K.R., Paik, J.: A provably-anonymous
authentication scheme for roaming services. International Journal
of Security and its Applications 10, 193-204 (2016)
316. Nam, J., Kim, M., Paik, J., Lee, Y., Won, D.: A
provably-secure ECC-based authentication scheme for wireless sensor
networks. Sensors 14, 21023-21044 (2014)
317. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a
nonce-based user authentication scheme using smart cards. IEICE
Transactions on Fundamentals of Electronics, Communications and
Computer Sciences E90-A, 299-302 (2007)
318. Nanni, L., Lumini, A.: Human authentication featuring
signatures and tokenised random numbers. Neurocomputing 69, 858-861
(2006)
319. Nanni, L., Lumini, A.: Random subspace for an improved
BioHashing for face authentication. Pattern Recognition Letters 29,
295-300 (2008)
320. Nayak, A., Bansode, R.: Analysis of Knowledge Based
Authentication System Using Persuasive Cued Click Points. Procedia
Computer Science 79, 553-560 (2016)
321. Nguyen, C.X., Huang, H.-H., Kawagoe, K.: POSTER: Graphical
password using object-based image ranking. Proceedings of the 2013
ACM SIGSAC conference on Computer & communications security.
ACM, Berlin, Germany (2013)
322. Nguyen, T.A.T., Dang, T.K.: Combining Fuzzy Extractor in
Biometric-Kerberos Based Authentication Protocol. In: 2015
International Conference on Advanced Computing and Applications
(ACOMP), pp. 1-6. (2015)
323. Nicholson, J., Dunphy, P., Coventry, L., Briggs, P.,
Olivier, P.: A security assessment of tiles: a new portfolio-based
graphical authentication system. CHI '12 Extended Abstracts on
Human Factors in Computing Systems. ACM, Austin, Texas, USA
(2012)
324. Nigam, A., Gupta, P.: Designing an accurate hand biometric
based authentication system fusing finger knuckleprint and
palmprint. Neurocomputing 151, 1120-1132 (2015)
325. Nigam, A., Tiwari, K., Gupta, P.: Multiple texture
information fusion for finger-knuckle-print authentication system.
Neurocomputing 188, 190-205 (2016)
326. Niinuma, K., Jain, A.K.: Continuous user authentication
using temporal information. In: SPIE Defense, Security, and
Sensing, pp. 76670L-76670L-76611. International Society for Optics
and Photonics, (2010)
327. Niinuma, K., Park, U., Jain, A.K.: Soft Biometric Traits
for Continuous User Authentication. IEEE Transactions on
Information Forensics and Security 5, 771-780 (2010)
328. Nikolić, D., Vuksanović, B., Nguyen, C.: Attribute
selection and intrusion detection for knowledge-based
authentication systems. In: Proceedings of the 12th IASTED
International Conference on Artificial Intelligence and Soft
Computing, ASC 2008, pp. 202-207. (2008)
329. Nosseir, A., Connor, R., Renaud, K.: Question-based group
authentication. Proceedings of the 18th Australia conference on
Computer-Human Interaction: Design: Activities, Artefacts and
Environments. ACM, Sydney, Australia (2006)
330. Ntalianis, K., Tsapatsoulis, N., Drigas, A.: Video-Object
Oriented Biometrics Hiding for User Authentication under
Error-Prone Transmissions. EURASIP Journal on Information Security
2011, 1-12 (2011)
331. Odelu, V., Das, A.K., Goswami, A.: An Effective and Robust
Secure Remote User Authenticated Key Agreement Scheme Using Smart
Cards in Wireless Communication Systems. Wireless Personal
Communications 84, 2571-2598 (2015)
332. O'Gorman, L., Bagga, A., Bentley, J.: Query-directed
passwords. Computers & Security 24, 546-560 (2005)
333. O'Gorman, L., Sammon, M.J., Bentley, J., Skiba, D.J.,
Erhart, G.W.: Options for spoken human-computer authentication in
mobile environments. In: Proceedings of the 3rd IASTED
International Conference on Human-Computer Interaction, HCI 2008,
pp. 230-235. (2008)
334. Onali, T., Ginesu, G.: Transmission-efficient image-based
authentication for mobile devices. In: International Workshop on
Visual Content Processing and Representation, pp. 22-28. Springer,
(2005)
335. Ota, H., Aoyama, S., Watanabe, R., Ito, K., Miyake, Y.,
Aoki, T.: Implementation and evaluation of a remote authentication
system using touchless palmprint recognition. Multimedia Systems
19, 117-129 (2013)
336. Ouda, O., Tsumura, N., Nakaguchi, T.: BioEncoding: A
reliable tokenless cancelable biometrics scheme for protecting
iriscodes. IEICE Transactions on Information and Systems E93-D,
1878-1888 (2010)
337. Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable
biometrics scheme for protecting iriscodes. In: Proceedings -
International Conference on Pattern Recognition, pp. 882-885.
(2010)
338. Ouyang, H., Lee, T.: A new lip feature representation
method for video-based bimodal authentication. Proceedings of the
2005 NICTA-HCSNet Multimodal User Interaction Workshop - Volume 57.
Australian Computer Society, Inc., Sydney, Australia (2006)
339. Palaniappan, R.: Two-stage biometric authentication method
using thought activity brain waves. International Journal of Neural
Systems 18, 59-66 (2008)
340. Park, M., Kita, Y., Aburada, K., Okazaki, N.: Proposal of a
puzzle authentication method with shoulder-surfing attack
resistance. In: Proceedings - 2014 International Conference on
Network-Based Information Systems, NBiS 2014, pp. 495-500.
(2014)
341. Part, Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.:
Cryptanalysis and improvement of a biometrics-based multi-server
authentication with key agreement scheme. Lecture Notes in Computer
Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), vol. 7335 LNCS,
pp. 391-406 (2012)
342. Part, Kim, J., Jim, S.: Authentication and key agreement
method for home networks using a smart card. Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), vol. 4705 LNCS,
pp. 655-665 (2007)
343. Part, Yoo, S., Yoo, J., Park, P., Ryou, J.: A lightweight
and stable authentication method for the internet access control in
smartphones. Communications in Computer and Information Science,
vol. 251 CCIS, pp. 331-342 (2011)
344. Patel, A., Kalajdzic, K., Golafshan, L., Taghavi, M.:
Design and implementation of a zero-knowledge authentication
framework for Java Card. International Journal of Information
Security and Privacy 5, 1-18 (2011)
345. Pathan, A.-S.K., Hong, C.S.: Bilinear-pairing-based remote
user authentication schemes using smart cards. Proceedings of the
3rd International Conference on Ubiquitous Information Management
and Communication. ACM, Suwon, Korea (2009)
346. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E.,
van der Lubbe, J.C.A.: Cryptanalysis of an EPC Class-1 Generation-2
standard compliant authentication protocol. Engineering
Applications of Artificial Intelligence 24, 1061-1069 (2011)
347. Peris-Lopez, P., Lim, T.-L., Li, T.: Providing stronger
authentication at a low cost to RFID tags operating under the
EPCglobal framework. In: International Conference on Embedded and
Ubiquitous Computing, 2008. EUC'08. IEEE/IFIP, pp. 159-166. IEEE,
(2008)
348. Phan, D.T., Truong, T.T., Tran, M.T., Duong, A.D.: Two-way
biometrics-based authentication scheme on mobile devices. Lecture
Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), vol.
8860, pp. 177-190 (2014)
349. Phua, K., Chen, J., Dat, T.H., Shue, L.: Heart sound as a
biometric. Pattern Recognition 41, 906-919 (2008)
350. Pintor Maestre, D.: QRP: An improved secure authentication
method using QR codes. (2012)
351. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Robust Smart Card
Authentication Scheme for Multi-server Architecture. Wireless
Personal Communications 72, 729-745 (2013)
352. Pishva, D.: Spectroscopic Approach for Aliveness Detection
in Biometrics Authentication. In: 2007 41st Annual IEEE
International Carnahan Conference on Security Technology, pp.
133-137. IEEE, (2007)
353. Podilchuk, C., Barinov, L., Hulbert, W., Jairaj, A.: Face
recognition in a tactical environment. In: MILITARY COMMUNICATIONS
CONFERENCE, 2010 - MILCOM 2010, pp. 900-905. (2010)
354. Preuveneers, D., Joosen, W.: SmartAuth: dynamic context
fingerprinting for continuous user authentication. Proceedings of
the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca,
Spain (2015)
355. Qi, M., Lu, Y., Li, J., Li, X., Kong, J.: User-specific
iris authentication based on feature selection. In: Proceedings -
International Conference on Computer Science and Software
Engineering, CSSE 2008, pp. 1040-1043. (2008)
356. Qiao, M., Zhang, S., Sung, A.H., Liu, Q.: A Novel
Touchscreen-Based Authentication Scheme Using Static and Dynamic
Hand Biometrics. In: Proceedings - International Computer Software
and Applications Conference, pp. 494-503. (2015)
357. Rajasekaran, M.P., Suresh, M., Dhanasekaran, U.: Multimodal
biometric recognition using sclera and fingerprint based on ANFIS.
In: 2014 International Conference on Recent Trends in Information
Technology, ICRTIT 2014. (2014)
358. Ramanathan, V., Wechsler, H.: Robust human authentication
using appearance and holistic anthropometric features. Pattern
Recognition Letters 31, 2425-2435 (2010)
359. Ranjan, P., Om, H.: An Efficient Remote User Password
Authentication Scheme based on Rabin’s Cryptosystem. Wireless
Personal Communications 1-28 (2016)
360. Rathgeb, C., Uhl, A.: Secure iris recognition based on
local intensity variations. In: International Conference Image
Analysis and Recognition, pp. 266-275. Springer, (2010)
361. Ray, P.P.: Ray’s scheme: graphical password based hybrid
authentication system for smart hand held devices. International
journal of computer trends and technology 3, 235-241 (2012)
362. Renaud, K.: A visuo-biometric authentication mechanism for
older users. People and Computers XIX—The Bigger Picture, pp.
167-182. Springer (2006)
363. Revett, K.: A bioinformatics based approach to user
authentication via keystroke dynamics. International Journal of
Control, Automation and Systems 7, 7-15 (2009)
364. Ribeiro, M.A.C., Scharcanski, J., Schuck, A.: An user
identity authentication scheme adaptive to changes in face
appearance. In: Instrumentation and Measurement Technology
Conference (I2MTC), 2011 IEEE, pp. 1-5. (2011)
365. Ritter, D., Schaub, F., Walch, M., Weber, M.: MIBA:
multitouch image-based authentication on smartphones. CHI '13
Extended Abstracts on Human Factors in Computing Systems. ACM,
Paris, France (2013)
366. Rohith, G., Bhuvaneswari, M., Kannaki, S.: Optimization of
dynamic resistance against malicious attacks & collusion
through enhanced authentication schemes in application to
smartcard. In: 2015 IEEE 7th National Conference on Computing,
Communication and Information Systems, NCCCIS 2015, pp. 5-10.
(2015)
367. Roth, V., Schmidt, P., G, B., ldenring: The IR ring:
authenticating users' touches on a multi-touch display. Proceedings
of the 23nd annual ACM symposium on User interface software and
technology. ACM, New York, New York, USA (2010)
368. Ryu, E.-K., Kim, D.-S., Yoo, K.-Y.: On Elliptic Curve Based
Untraceable RFID Authentication Protocols. Proceedings of the 3rd
ACM Workshop on Information Hiding and Multimedia Security. ACM,
Portland, Oregon, USA (2015)
369. Sadqi, Y., Asimi, A., Asimi, Y.: A Cryptographic Mutual
Authentication Scheme for Web Applications. arXiv preprint
arXiv:1412.2908 (2014)
370. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.:
Biometric-rich gestures: a novel approach to authentication on
multi-touch devices. Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems. ACM, Austin, Texas, USA (2012)
371. Sae-Bae, N., Jakobsson, M.: Hand authentication on
multi-touch tablets. Proceedings of the 15th Workshop on Mobile
Computing Systems and Applications. ACM, Santa Barbara, California
(2014)
372. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.:
Continuous user authentication using multi-modal biometrics.
Computers & Security 53, 234-246 (2015)
373. Safie, S.I., Soraghan, J.J., Petropoulakis, L.:
Electrocardiogram (ECG) biometric authentication using pulse active
ratio (PAR). IEEE Transactions on Information Forensics and
Security 6, 1315-1322 (2011)
374. Sagar, K., Waghmare, V.: “Measuring the Security and
Reliability of Authentication of Social Networking Sites”. Procedia
Computer Science 79, 668-674 (2016)
375. Sakata, K., Maeda, T., Matsushita, M., Sasakawa, K.,
Tamaki, H.: Fingerprint authentication based on matching scores
with other data. Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 3832 LNCS, pp. 280-286 (2006)
376. Samangouei, P., Patel, V.M., Chellappa, R.: Facial
Attributes for Active Authentication on Mobile Devices. Image and
Vision Computing (2016)
377. Sandirigama, M., Shimizu, A.: Simple and secure password
authentication protocol (SAS). IEICE Transactions on Communications
83, 1363-1365 (2000)
378. Sarier, N.D.: A new approach for biometric template storage
and remote authentication. In: International Conference on
Biometrics, pp. 909-918. Springer, (2009)
379. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Robust
Biometric-Based Authentication Scheme for Wireless Body Area
Network Using Elliptic Curve Cryptosystem. Proceedings of the Third
International Symposium on Women in Computing and Informatics. ACM,
Kochi, India (2015)
380. Sasamoto, H., Christin, N., Hayashi, E.: Undercover:
authentication usable in front of prying eyes. Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems. ACM,
Florence, Italy (2008)
381. Sathish Babu, B., Venkataram, P.: Transaction based
authentication scheme for mobile communication: A cognitive agent
based approach. In: Proceedings - 21st International Parallel and
Distributed Processing Symposium, IPDPS 2007; Abstracts and CD-ROM.
(2007)
382. Schneegass, S., Oualil, Y., Bulling, A.: SkullConduct:
Biometric User Identification on Eyewear Computers Using Bone
Conduction Through the Skull. Proceedings of the 2016 CHI
Conference on Human Factors in Computing Systems. ACM, Santa Clara,
California, USA (2016)
383. Shanmugapriya, D., Padmavathi, G.: A wrapper based feature
subset selection using ACO-ELM-ANP and GA-ELM-ANP approaches for
keystroke dynamics authentication. In: International Conference on
Signal Processing, Image Processing and Pattern Recognition 2013,
ICSIPR 2013. (2013)
384. Shen, H., Gao, C., He, D., Wu, L.: New biometrics-based
authentication scheme for multi-server environment in critical
systems. Journal of Ambient Intelligence and Humanized Computing 6,
825-834 (2015)
385. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: A modified remote
user authentication scheme using smart cards. IEEE Transactions on
Consumer Electronics 49, 414-416 (2003)
386. Shen, Z.-h.: A new modified remote user authentication
scheme using smart cards. Applied Mathematics-A Journal of Chinese
Universities 23, 371-376 (2008)
387. Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision
tree-based method for user authentication based on keystroke
patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part
B: Cybernetics 35, 826-833 (2005)
388. Shi, P., Zhu, B., Youssef, A.: A PIN Entry Scheme Resistant
to Recording-Based Shoulder-Surfing. In: 2009 Third International
Conference on Emerging Security Information, Systems and
Technologies, pp. 237-241. (2009)
389. Shi, W.-M., Yang, Y.-G., Zhou, Y.-H.: Quantum
signature-masked authentication schemes. Optik - International
Journal for Light and Electron Optics 126, 3544-3548 (2015)
390. Shieh, W.G., Wang, M.T.: Improvement of chen et al.’s
fingerprint biometric remote authentication scheme. ICIC Express
Letters 9, 1571-1575 (2015)
391. Shimizu, A., Horioka, T., Inagaki, H.: A password
authentication method for contents communications on the Internet.
IEICE transactions on communications 81, 1666-1673 (1998)
392. Shimizu, A.: A dynamic password authentication method using
a one‐way function. Systems and computers in Japan 22, 32-40
(1991)
393. Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.:
SmartPass: A smarter geolocation-based authentication scheme.
Security and Communication Networks 8, 3927-3938 (2015)
394. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.:
One time password authentication scheme based on elliptic curves
for Internet of Things (IoT). In: Information Technology: Towards
New Smart World (NSITNSW), 2015 5th National Symposium on, pp. 1-6.
(2015)
395. Shuren, L., Qiuyan, Z., Chao, C., Yiqi, D.: A
unidirectional one-time password authentication scheme without
counter desynchronization. In: 2009 Second ISECS International
Colloquium on Computing, Communication, Control, and Management,
CCCM 2009, pp. 361-364. (2009)
396. Singh, Y.N., Singh, S.K., Gupta, P.: Fusion of
electrocardiogram with unobtrusive biometrics: An efficient
individual authentication system. Pattern Recognition Letters 33,
1932-1941 (2012)
397. Sodhi, B.: Using dropped call as an authentication factor.
In: Proceedings - 15th IEEE International Conference on Computer
and Information Technology, CIT 2015, 14th IEEE International
Conference on Ubiquitous Computing and Communications, IUCC 2015,
13th IEEE International Conference on Dependable, Autonomic and
Secure Computing, DASC 2015 and 13th IEEE International Conference
on Pervasive Intelligence and Computing, PICom 2015, pp. 2031-2035.
(2015)
398. Somayaji, A., Mould, D., Brown, C.: Towards narrative
authentication: or, against boring authentication. Proceedings of
the 2013 workshop on New security paradigms workshop. ACM, Banff,
Alberta, Canada (2013)
399. Sreeja, C.S., Misbahuddin, M.: A secure image-based
authentication scheme employing DNA crypto and steganography. In:
ACM International Conference Proceeding Series, pp. 595-601.
(2015)
400. Sreeramareddy, L., Miao, S., Feng, J.H.: Investigating
gesture-based password: usability and vulnerability to
shoulder-surfing attacks. Proceedings of the 2014 Conference on
Research in Adaptive and Convergent Systems. ACM, Towson, Maryland
(2014)
401. Srinivasa, K.G., Gosukonda, S.: Continuous multimodal user
authentication: coupling hard and soft biometrics with support
vector machines to attenuate noise. CSI Transactions on ICT 2,
129-140 (2014)
402. Sriram, J.C., Shin, M., Choudhury, T., Kotz, D.:
Activity-aware ECG-based patient authentication for remote health
monitoring. Proceedings of the 2009 international conference on
Multimodal interfaces. ACM, Cambridge, Massachusetts, USA
(2009)
403. Srisuk, S., Petrou, M., Kurutach, W., Kadyrov, A.: A face
authentication system using the trace transform. Pattern Analysis
and Applications 8, 50-61 (2005)
404. Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN:
Secure mobile transaction authentication. In: International
Conference on Availability, Reliability and Security, 2009.
ARES'09., pp. 578-583. IEEE, (2009)
405. Sun, H.-M.: An efficient remote use authentication scheme
using smart cards. IEEE Transactions on Consumer Electronics 46,
958-961 (2000)
406. Suoranta, S., Andrade, A., Aura, T.: Strong authentication
with mobile phone. Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 7483 LNCS, pp. 70-85 (2012)
407. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric
authentication scheme based on robust hashing. Proceedings of the
7th workshop on Multimedia and security. ACM, New York, NY, USA
(2005)
408. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations
in feature vector structure in keystroke dynamics authentication
systems. Software Quality Journal 24, 137-157 (2016)
409. Takada, T., Koike, H.: Awase-E: Image-based authentication
for mobile phones using user’s favorite images. In: International
Conference on Mobile Human-Computer Interaction, pp. 347-351.
Springer, (2003)
410. Takada, T., Kokubun, Y.: Extended PIN authentication scheme
allowing multi-touch key input. In: ACM International Conference
Proceeding Series, pp. 307-310. (2013)
411. Takada, T.: FakePointer: An authentication scheme for
improving security against peeping attacks using video cameras. In:
Proceedings - The 2nd International Conference on Mobile Ubiquitous
Computing, Systems, Services and Technologies, UBICOMM 2008, pp.
395-400. (2008)
412. Tamrakar, S., Ekberg, J.-E., Asokan, N.: Identity
verification schemes for public transport ticketing with NFC
phones. Proceedings of the sixth ACM workshop on Scalable trusted
computing. ACM, Chicago, Illinois, USA (2011)
413. Tan, Z.: Analysis and improvement of a user authentication
improved protocol. Journal of Networks 5, 622-630 (2010)
414. Tan, Z.: Improvement on a password authentication scheme
for multi-server environments. Journal of Convergence Information
Technology 6, 218-228 (2011)
415. Tang, Y., Hidenori, N., Urano, Y.: User authentication on
smart phones using a data mining method. In: 2010 International
Conference on Information Society, i-Society 2010, pp. 173-178.
(2010)
416. Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: A multiple
layer fusion approach on keystroke dynamics. Pattern Analysis and
Applications 14, 23-36 (2011)
417. Thiranant, N., Lee, H.: A Design of e-Healthcare
Authentication Framework with QR Code. International Journal of
Security and Its Applications 8, 79-86 (2014)
418. Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and
security evaluation of GeoPass: a geographic location-password
scheme. Proceedings of the Ninth Symposium on Usable Privacy and
Security. ACM, Newcastle, United Kingdom (2013)
419. Thorpe, J., Oorschot, P.C.v., Somayaji, A.: Pass-thoughts:
authenticating with our minds. Proceedings of the 2005 workshop on
New security paradigms. ACM, Lake Arrowhead, California (2005)
420. Topkara, U., Atallah, M.J., Topkara, M.: Passwords decay,
words endure: secure and re-usable multiple password mnemonics.
Proceedings of the 2007 ACM symposium on Applied computing. ACM,
Seoul, Korea (2007)
421. Traore, I., Woungang, I., Obaidat, M.S., Nakkabi, Y., Lai,
I.: Online risk-based authentication using behavioral biometrics.
Multimedia Tools and Applications 71, 575-605 (2014)
422. Trojahn, M., Ortmeier, F.: Biometric authentication through
a virtual keyboard for smartphones. International Journal of
Computer Science & Information Technology 4, 1 (2012)
423. Truong, T.T., Tran, M.T., Duong, A.D.: Modified efficient
and secure dynamic ID-based user authentication scheme. Lecture
Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), vol.
7804 LNCS, pp. 409-415 (2013)
424. Tsai, J.-L., Lo, N.-W., Wu, T.-C.: A New Password-Based
Multi-server Authentication Scheme Robust to Password Guessing
Attacks. Wireless Personal Communications 71, 1977-1988 (2013)
425. Tsai, J.-L.: Efficient multi-server authentication scheme
based on one-way hash function without verification table.
Computers & Security 27, 115-121 (2008)
426. Tsalakanidou, F., Malassiotis, S., Strintzis, M.G.:
Exploitation of 3D images for face authentication under pose and
illumination variations. In: 3D Data Processing, Visualization and
Transmission, 2004. 3DPVT 2004. Proceedings. 2nd International
Symposium on, pp. 50-57. (2004)
427. Tseng, Y.-M., Wu, T.-Y., Wu, J.-D.: A pairing-based user
authentication scheme for wireless clients with smart cards.
Informatica 19, 285-302 (2008)
428. Tsuchiya, T., Kihara, M., Berena, A.J.P.: Transmission
time-based authentication scheme using 3G mobile device for DRM
system. In: 2009 IEEE International Frequency Control Symposium
Joint with the 22nd European Frequency and Time Forum, pp. 706-710.
(2009)
429. Tullis, T.S., Tedesco, D.P.: Using personal photos as
pictorial passwords. CHI '05 Extended Abstracts on Human Factors in
Computing Systems. ACM, Portland, OR, USA (2005)
430. Umar, M.S., Rafiq, M.Q.: Select-to-Spawn: A novel
recognition-based graphical user authentication scheme. In: 2012
IEEE International Conference on Signal Processing, Computing
an