Accepted Articles for Authentication Schemes and Methods: a Systematic Literature Review

Acceptance Topic 1 (AT1): Authentication Schemes

1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment. International Journal of Security and Its Applications (IJSIA) 9, 35-46 (2015) 2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognition Letters (2015) 3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A comparative approach between cepstral features for human authentication using heart sounds. Signal, Image and Video Processing 10, 843-851 (2016) 4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: User authentication through biometric sensors and decision fusion. In: 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. (2013) 5. Adida, B.: EmID: Web authentication by email address. In: Proceedings of Web. (2008) 6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools and Applications 1-19 (2016) 7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical passwords for augmenting, not replacing, text passwords. Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New Orleans, Louisiana, USA (2013) 8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In: 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 369-374. (2013) 10. Ali, A.M.: Zero footprint secure internet authentication using network smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3928 LNCS, pp. 91-104 (2006) 11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke Biometric Systems for User Authentication. Journal of Signal Processing Systems 1-16 (2016) 12. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58, 108-116 (2013) 13. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: IPAS: Implicit password authentication system. In: IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pp. 430-435. IEEE, (2011) 14. Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security (WorldCIS), pp. 223-225. (2011) 15. Alrawais, A., Alhothaily, A., Cheng, X.: Secure authentication scheme using dual channels in rogue access point environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8491, pp. 554-563 (2014) 16. Alzomai, M., Alfayyadh, B., Jøsang, A.: Display security for online transactions: SMS-based authentication scheme. In: 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. (2010) 17. Alzomai, M., Jøsang, A., McCullagh, A., Foo, E.: Strengthening SMS-based authentication through usability. In: Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, pp. 683-688. (2008) 18. Amin, R., Biswas, G.P.: A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. Journal of Medical Systems 39, 1-17 (2015) 19. Amin, R., Biswas, G.P.: Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card. Arabian Journal for Science and Engineering 40, 3135-3149 (2015) 20. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical Systems 39, 1-18 (2015) 21. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I., Cameron, D., Fischer, M.H.: VIP: a visual approach to user authentication. Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, Trento, Italy (2002) 22. Annapurani, K., Sadiq, M.A.K., Malathy, C.: Fusion of shape of the ear and tragus – A unique feature extraction method for ear authentication system. Expert Systems with Applications 42, 649-656 (2015) 23. Antal, M., Szabó, L.Z.: Biometric Authentication Based on Touchscreen Swipe Patterns. Procedia Technology 22, 862-869 (2016) 24. Arif, A., Pahud, M., Hinckley, K., Buxton, W.: A tap and gesture hybrid method for authenticating smartphone users. Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services. ACM, Munich, Germany (2013) 25. Arthur Evans, Jr., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17, 437-442 (1974) 26. Assaad, F.S., Serpen, G.: Transformation based Score Fusion Algorithm for Multi-modal Biometric User Authentication through Ensemble Classification. Procedia Computer Science 61, 410-415 (2015) 27. Atallah, M.J., Frikken, K.B., Goodrich, M.T., Tamassia, R.: Secure biometric authentication for weak computational devices. In: Lecture Notes in Computer Science, pp. 357-371. (2005) 28. Awasthi, A.K., Lal, S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics 49, 1246-1248 (2003) 29. Awasthi, A.K., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 583-586 (2004) 30. Awasthi, A.K., Srivastava, K.: A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems 37, 1-4 (2013) 31. Aykut, M., Ekinci, M.: Developing a contactless palmprint authentication system by introducing a novel ROI extraction method. Image and Vision Computing 40, 65-74 (2015) 32. Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making 7, 243-256 (2008) 33. Babu, B.S., Venkataram, P.: An authentication scheme for personalized mobile multimedia services: A cognitive agents based approach. In: Proceedings of Future Generation Communication and Networking, FGCN 2007, pp. 167- 172. (2007) 34. Babu, B.S., Venkataram, P.: Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS). Computer Communications 31, 4060-4071 (2008) 35. Bai, Z., Hatzinakos, D.: LBP-based biometric hashing scheme for human authentication. In: 11th International Conference on Control, Automation, Robotics and Vision, ICARCV 2010, pp. 1842-1847. (2010) 36. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Computers & Security 43, 77-89 (2014) 37. Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information Conference (SAI), 2014, pp. 601-606. (2014) 38. Bandyopadhyay, S.K., Bhattacharyya, D., Das, P.: User authentication by Secured Graphical Password Implementation. In: Information and Telecommunication Technologies, 2008. APSITT. 7th Asia-Pacific Symposium on, pp. 7-12. (2008) 39. Banerjee, P.K., Chandra, J.K., Datta, A.K.: Feature based optimal trade-off parameter selection of frequency domain correlation filter for real time face authentication. Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, Rourkela, Odisha, India (2011) 40. Bansal, M., Hanmandlu, M., Kumar, P.: IRIS based authentication using local principal independent components. Optik - International Journal for Light and Electron Optics 127, 4808-4814 (2016) 41. Bashir, M., Scharfenberg, G., Kempf, J.: Person Authentication by Handwriting in air using a Biometric Smart Pen Device. BIOSIG 191, 219-226 (2011) 42. Bennet, D., Arumugaperumal, S.: Fingerprint based multi-server authentication system. In: International Conference on Electronics Computer Technology (ICECT), 2011 3rd, pp. 115-119. (2011) 43. Best, D.S., Duchowski, A.T.: A rotary dial for gaze-based PIN entry. Proceedings of the Ninth Biennial ACM Symposium on Eye Tracking Research & Applications. ACM, Charleston, South Carolina (2016) 44. Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework. Journal of Medical Informatics & Technologies 23, (2014) 45. Bianchi, A., Oakley, I., Kwon, D.S.: The secure haptic keypad: a tactile password system. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta, Georgia, USA (2010) 46. Bianchi, A., Oakley, I., Kwon, D.S.: Using mobile device screens for authentication. Proceedings of the 23rd Australian Computer-Human Interaction Conference. ACM, Canberra, Australia (2011) 47. Bicakci, K., Oorschot, P.C.v.: A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. Proceedings of the 2011 workshop on New security paradigms workshop. ACM, Marin County, California, USA (2011) 48. Binu, S., Misbahuddin, M., Raj, P.: A Single Sign on based secure remote user authentication scheme for Multi- Server Environments. In: International Conference on Computer and Communications Technologies (ICCCT), 2014, pp. 1-6. (2014) 49. Borisov, A.: A Novel Approach for User Authentication to Industrial Components Using QR Codes. In: Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, pp. 61-66. IEEE, (2015) 50. Boudguiga, A., Laurent, M.: An ID-based authentication scheme for the IEEE 802.11s mesh network. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010, pp. 256-263. (2010) 51. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know. Proceedings of the 13th ACM conference on Computer and communications security. ACM, Alexandria, Virginia, USA (2006) 52. Brown, M., Doswell, F.R.: Using passtones instead of passwords. Proceedings of the 48th Annual Southeast Regional Conference. ACM, Oxford, Mississippi (2010) 53. Bulling, A., Alt, F., Schmidt, A.: Increasing the security of gaze-based cued-recall graphical passwords using saliency masks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012) 54. Cagalj, M., Perkovic, T., Bugaric, M.: Timing attacks on cognitive authentication schemes. IEEE Transactions on Information Forensics and Security 10, 584-596 (2015) 55. Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Proceedings of the second ACM conference on Wireless network security. ACM, Zurich, Switzerland (2009) 56. Carter, N.J.: Graphical Passwords for Older Computer Users. Adjunct Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. ACM, Daegu, Kyungpook, Republic of Korea (2015) 57. Catuogno, L., Galdi, C.: On user authentication by means of video events recognition. Journal of Ambient Intelligence and Humanized Computing 5, 909-918 (2014) 58. Chang, C.-C., Hsueh, W.-Y., Cheng, T.-F.: A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wireless Personal Communications 89, 447-465 (2016) 59. Chang, Y.-F., Chang, C.-C., Kuo, J.-Y.: A secure one-time password authentication scheme using smart cards without limiting login times. SIGOPS Oper. Syst. Rev. 38, 80-90 (2004) 60. Chatzis, V., Bors, A.G., Pitas, I.: Multimodal decision-level fusion for person authentication. IEEE transactions on systems, man, and cybernetics-part a: systems and humans 29, 674-680 (1999) 61. Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K.: An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. Journal of Medical Systems 39, 1-12 (2015) 62. Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools and Applications 1-21 (2016) 63. Chelliah, B., Geetha, S.: Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. Communications in Computer and Information Science, vol. 420 CCIS, pp. 461- 472 (2014) 64. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. International Journal of Communication Systems 27, 377-389 (2014) 65. Chen, C.-L., Deng, Y.-Y.: Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence 22, 1284-1291 (2009) 66. Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. Proceedings of the 12th annual international conference on Mobile systems, applications, and services. ACM, Bretton Woods, New Hampshire, USA (2014) 67. Chen, T., Huang, S.H.: Tree parity machine-based one-time password authentication schemes. In: Proceedings of the International Joint Conference on Neural Networks, pp. 257-261. (2008) 68. Chen, T.-Y., Lee, C.-C., Hwang, M.-S., Jan, J.-K.: Towards secure and efficient user authentication scheme using smart card for multi-server environments. The Journal of Supercomputing 66, 1008-1032 (2013) 69. Chen, Y., Chou, J.-S., Sun, H.-M.: A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52, 2373-2380 (2008) 70. Chen, Y., Chou, J.-S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research 15, 97-120 (2015) 71. Chen, Y., Shu, J., Yang, F., Chen, H.: User authentication and data cryptograph system based on biometric key for wireless sensor networks. Journal of Computational Information Systems 9, 3949-3959 (2013) 72. Cheng, F.: A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password Token. In: 2010 IEEE 34th Annual Computer Software and Applications Conference, pp. 147-154. (2010) 73. Cheng, F.: Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm. Mobile Networks and Applications 16, 304-336 (2011) 74. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication scheme for remote user login and verification. International Journal of Innovative Computing, Information and Control 8, 5499-5511 (2012) 75. Cheul Shin, K., Jong Oh, K.: Smartcard-based remote authentication scheme preserving user anonymity. International Journal of Information Processing and Management 4, 10-18 (2013) 76. Chiang, H.-Y., Chiasson, S.: Improving user authentication on mobile devices: a touchscreen graphical password. Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services. ACM, Munich, Germany (2013) 77. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp. 245- 248. IEEE, (2005) 78. Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with Applications 69, 58-65 (2015) 79. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications 34, 391-397 (2011) 80. Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code. In: Proceedings - 2011 International Conference on Mobile IT-Convergence, ICMIC 2011, pp. 109-113. (2011) 81. Choi, S., Zage, D.: Addressing insider threat using “where you are” as fourth factor authentication. In: Security Technology (ICCST), 2012 IEEE International Carnahan Conference on, pp. 147-153. (2012) 82. Chou, J.-S.: An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing 70, 75-94 (2014) 83. Chowdhury, S., Poet, R., Mackenzie, L.: Passhint: memorable and secure authentication. Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014) 84. Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.: Outsourceable two-party privacy-preserving biometric authentication. Proceedings of the 9th ACM symposium on Information, computer and communications security. ACM, Kyoto, Japan (2014) 85. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249-259. ACM, (2011) 86. Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Computers & Security 39, Part B, 127-136 (2013) 87. Dabbah, M., Woo, W., Dlay, S.: Secure authentication for face recognition. In: Computational Intelligence in Image and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, pp. 121-126. IEEE, (2007) 88. Das, A.K., Bruhadeshwar, B.: An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. Journal of Medical Systems 37, 1-17 (2013) 89. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 35, 1646-1656 (2012) 90. Das, R.K., Jelil, S., Mahadeva Prasanna, S.R.: Development of Multi-Level Speech based Person Authentication System. Journal of Signal Processing Systems 1-13 (2016) 91. David, D.B., Rajappa, M., Karupuswamy, T., Iyer, S.P.: A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System. Wireless Personal Communications 85, 241-261 (2015) 92. De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN: securing PIN entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103-1106. ACM, (2010) 93. De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: FIRME: Face and Iris Recognition for Mobile Engagement. Image and Vision Computing 32, 1161-1172 (2014) 94. De Marsico, M., Nappi, M., Riccio, D.: Face authentication with undercontrolled pose and illumination. Signal, Image and Video Processing 5, 401-413 (2011) 95. Denning, T., Bowers, K., Dijk, M.v., Juels, A.: Exploring implicit memory for painless password recovery. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada (2011) 96. Dhamija, R., Perrig, A.: Deja Vu-A User Study: Using Images for Authentication. In: USENIX Security Symposium, pp. 4-4. (2000) 97. Dhamija, R.: Hash visualization in user authentication. CHI '00 Extended Abstracts on Human Factors in Computing Systems. ACM, The Hague, The Netherlands (2000) 98. Dhondge, K., Choi, B.Y., Song, S., Park, H.: Optical Wireless authentication for smart devices using an onboard ambient light sensor. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1-8. (2014) 99. Ding, Y., Zhuang, D., Wang, K.: A study of hand vein recognition method. In: IEEE International Conference Mechatronics and Automation, 2005, pp. 2106-2110. IEEE, (2005) 100. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11, 383-396 (2013) 101. Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks 56, 3401-3416 (2012) 102. Drosou, A., Ioannidis, D., Moustakas, K., Tzovaras, D.: Spatiotemporal analysis of human activities for biometric authentication. Computer Vision and Image Understanding 116, 411-421 (2012) 103. Drosou, A., Ioannidis, D., Tzovaras, D., Moustakas, K., Petrou, M.: Activity related authentication using prehension biometrics. Pattern Recognition 48, 1743-1759 (2015) 104. Drosou, A., Moustakas, K., Tzovaras, D.: Event-based unobtrusive authentication using multi-view image sequences. Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in imagery streams. ACM, Firenze, Italy (2010) 105. Duc, B., Maître, G., Fischer, S., Bigün, J.: Person authentication by fusing face and speech information. In: International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 311-318. Springer, (1997) 106. Dutta, R.: Converting group key agreement protocol into password-based setting - Case study. Journal of Computers 2, 26-33 (2007) 107. Emam, A.H.M.: Additional authentication and authorization using registered email-ID for cloud computing. International Journal of Soft Computing and Engineering 3, 110-113 (2013) 108. English, R., Poet, R.: Towards a metric for recognition-based graphical password security. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 239-243 (2011) 109. Everts, M., Hoepman, J.-H., Siljee, J.: UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography. Proceedings of the 2013 ACM workshop on Digital identity management. ACM, Berlin, Germany (2013) 110. Fahmi, P.A., Kodirov, E., Choi, D.-J., Lee, G.-S., Azli, A.M.F., Sayeed, S.: Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2272-2276. IEEE, (2012) 111. Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. Proceedings of the 12th ACM workshop on Multimedia and security. ACM, Roma, Italy (2010) 112. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security 24, 619-628 (2005) 113. Fan, J.W., Chan, C.W., Chang, Y.F.: A random increasing sequence hash chain and smart card-based remote user authentication scheme. In: ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing. (2013) 114. Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y.: An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications 1-9 (2016) 115. Fan, R., He, D.-j., Pan, X.-z., Ping, L.-d.: An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University SCIENCE C 12, 550-560 (2011) 116. Fan, Y.T., Su, G.P.: Design of two-way one-time-password authentication scheme based on true random numbers. In: 2nd International Workshop on Computer Science and Engineering, WCSE 2009, pp. 11-14. (2009) 117. Farash, M.S., Kumari, S., Bakhtiari, M.: Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications 75, 4485-4504 (2016) 118. Farash, M.S.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing 70, 987-1001 (2014) 119. Flior, E., Kowalski, K.: Continuous biometric user authentication in online examinations. In: ITNG2010 - 7th International Conference on Information Technology: New Generations, pp. 488-492. (2010) 120. Fong, S., Zhuang, Y., Fister, I.: A biometric authentication model using hand gesture images. BioMedical Engineering OnLine 12, 1-18 (2013) 121. Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta, Georgia, USA (2010) 122. Frankel, A.D., Maheswaran, M.: Feasibility of a socially aware authentication scheme. In: 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. (2009) 123. Fridman, L., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision fusion for continuous authentication. Computers & Electrical Engineering 41, 142-156 (2015) 124. Gafurov, D., Bours, P., Snekkenes, E.: User authentication based on foot motion. Signal, Image and Video Processing 5, 457-467 (2011) 125. Giot, R., El-Abed, M., Hemery, B., Rosenberger, C.: Unconstrained keystroke dynamics authentication with shared secret. Computers & Security 30, 427-445 (2011) 126. Gnanaraj, J.W.K., Ezra, K., Rajsingh, E.B.: Smart card based time efficient authentication scheme for global grid computing. Human-centric Computing and Information Sciences 3, 1-14 (2013) 127. Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. CHI '02 Extended Abstracts on Human Factors in Computing Systems. ACM, Minneapolis, Minnesota, USA (2002) 128. Gong, L., Pan, J., Liu, B., Zhao, S.: A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords. Journal of Computer and System Sciences 79, 122-130 (2013) 129. Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications 62, 1-8 (2016) 130. Gope, P., Hwang, T.: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Personal Communications 82, 2231-2245 (2015) 131. Goutham, R.A., Kim, D.S., Yoo, K.Y.: Implicit graphical password mutual authentication using mirror-image encryption. In: Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, pp. 218-223. (2014) 132. Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca, Spain (2015) 133. Grover, J., Hanmandlu, M.: Hybrid fusion of score level and adaptive fuzzy decision level fusions for the finger- knuckle-print based authentication. Applied Soft Computing Journal 31, 1-13 (2015) 134. Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through hand gesture recognition. International Journal of Information Security 11, 65-83 (2012) 135. Gugenheimer, J., Luca, A.D., Hess, H., Karg, S., Wolf, D., Rukzio, E.: ColorSnakes: Using Colored Decoys to Secure Authentication in Sensitive Contexts. Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, Copenhagen, Denmark (2015) 136. Gugenheimer, J., Schaub, F., Neiswander, G.M., Guneratne, E., Weber, M.: User Authentication for Rotary Knob Controlled In-car Applications. Proceedings of the 6th International Conference on Automotive User Interfaces and Interactive Vehicular Applications. ACM, Seattle, WA, USA (2014) 137. Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-10 (2015) 138. Gupta, P., Gupta, P.: Multi-modal fusion of palm-dorsa vein pattern for accurate personal authentication. Knowledge-Based Systems 81, 117-130 (2015) 139. Gupta, P., Srivastava, S., Gupta, P.: An accurate infrared hand geometry and vein pattern based authentication system. Knowledge-Based Systems 103, 143-155 (2016) 140. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., Fu, H.: MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication. Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces. ACM, Madeira, Portugal (2015) 141. Gurav, S.M., Gawade, L.S., Rane, P.K., Khochare, N.R.: Graphical password authentication: Cloud securing scheme. In: Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies, ICESC 2014, pp. 479-483. (2014) 142. Gurung, B., Prasad, P.W.C., Alsadoon, A., Elchouemi, A.: Enhanced Virtual Password Authentication Scheme Resistant to Shoulder Surfing. In: 2015 Second International Conference on Soft Computing and Machine Intelligence (ISCMI), pp. 134-139. (2015) 143. Gy, odor, Szendi, t., Imre, n.: Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems. Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks. ACM, Bodrum, Turkey (2010) 144. Habib, K., Torjusen, A., Leister, W.: A novel authentication framework based on bio-metric and radio fingerprinting for the IoT in eHealth. In: Proceedings of International Conference on Smart Systems, Devices and Technologies (SMART), pp. 32-37. (2014) 145. Hafizul Islam, S.K., Biswas, G.P.: Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling 57, 2703-2717 (2013) 146. Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a security token for unified authentication. In: 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), pp. 68-68. IEEE, (2007) 147. Hammouri, G., Öztürk, E., Sunar, B.: A tamper-proof and lightweight authentication scheme. Pervasive and Mobile Computing 4, 807-818 (2008) 148. Hang, A., Luca, A.D., Hussmann, H.: I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 149. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-7 (2013) 150. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010) 151. He, D., Chen, J., Chen, Y.: A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 5, 1423-1429 (2012) 152. He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321, 263-277 (2015) 153. He, D., Wang, D.: Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Systems Journal 9, 816-823 (2015) 154. Herzberg, A., Margulies, R.: My authentication album: Adaptive images-based login mechanism. In: IFIP International Information Security Conference, pp. 315-326. Springer, (2012) 155. Hintze, D., Findling, R.D., Muaaz, M., Koch, E., Ren, Mayrhofer: Cormorant: towards continuous risk-aware multi- modal cross-device authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, Osaka, Japan (2015) 156. Hoang, T., Choi, D., Nguyen, T.: Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. International Journal of Information Security 14, 549-560 (2015) 157. Hocquet, S., Ramel, J.-Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), pp. 224-229. IEEE, (2005) 158. Hong, F., Wei, M., You, S., Feng, Y., Guo, Z.: Waving Authentication: Your Smartphone Authenticate You on Motion Gesture. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 159. Hong, S.: Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques 1-7 (2015) 160. Hsieh, C.-Y., Lin, W.-Y.: Video-based human action and hand gesture recognition by fusing factored matrices of dual tensors. Multimedia Tools and Applications 1-20 (2016) 161. Hsieh, W.B., Leu, J.S.: Design of a time and location based One-Time Password authentication scheme. In: IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, pp. 201-206. (2011) 162. Hu, L.-l., Niu, X.-x., Yang, Y.-x.: Weaknesses and improvements of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 14, 91-94 (2007) 163. Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein authentication based on wide line detector and pattern normalization. In: International Conference on Pattern Recognition (ICPR), 2010 20th, pp. 1269-1272. IEEE, (2010) 164. Huang, H.F., Chang, H.W., Yu, P.K.: Enhancement of timestamp-based user authentication scheme with smart card. International Journal of Network Security 16, 463-467 (2014) 165. Huang, Y., Huang, Z., Zhao, H., Lai, X.: A new One-time Password Method. IERI Procedia 4, 32-37 (2013) 166. Huang, Y.L., Lu, P.H., Tygar, J.D., Joseph, A.D.: OSNP: Secure wireless authentication protocol using one-time key. Computers & Security 28, 803-815 (2009) 167. Hussain, A., Bhuiyan, A., Mian, A., Ramamohanarao, K.: Biometric Security Application for Person Authentication Using Retinal Vessel Feature. In: International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2013, pp. 1-8. (2013) 168. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on Communications E85-B, 823-825 (2002) 169. Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 28-30 (2000) 170. Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. International Journal of Computer Mathematics 70, 657-666 (1999) 171. Hwang, S.-s., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers & Security 28, 85-93 (2009) 172. Hwang, S.-s., Lee, H.-j., Cho, S.: Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Systems with Applications 36, 10649-10656 (2009) 173. Imtiaz, H., Fattah, S.A.: A face recognition scheme using wavelet-based local features. In: Computers & Informatics (ISCI), 2011 IEEE Symposium on, pp. 313-316. (2011) 174. Imtiaz, H., Fattah, S.A.: A wavelet-domain local feature selection scheme for face recognition. In: International Conference on Communications and Signal Processing (ICCSP), 2011, pp. 448-451. (2011) 175. Islam, M., Hasan, M.M., Farhad, M.M., Tanni, T.R.: Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method. In: Proceeding of the 15th International Conference on Computer and Information Technology, ICCIT 2012, pp. 61-64. (2012) 176. Islam, M.S.: Heartbeat biometrics for remote authentication using sensor embedded computing devices. International Journal of Distributed Sensor Networks 2015, (2015) 177. Islam, S.K.H., Biswas, G.P.: Improved remote login scheme based on ECC. In: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 1221-1226. (2011) 178. Islam, S.K.H., Khan, M.K., Obaidat, M.S., Muhaya, F.T.B.: Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wireless Personal Communications 84, 2013-2034 (2015) 179. Jagadiswary, D., Saraswady, D.: Biometric Authentication Using Fused Multimodal Biometric. Procedia Computer Science 85, 109-116 (2016) 180. Jain, A., Hong, L., Kulkarni, Y.: A multimodal biometric system using fingerprint, face and speech. In: Proceedings of 2nd Int'l Conference on Audio-and Video-based Biometric Person Authentication, Washington DC, pp. 182-187. (1999) 181. Jain, A., Kanhangad, V.: Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recognition Letters 68, Part 2, 351-360 (2015) 182. Jakobsson, M., Yang, L., Wetzel, S.: Quantifying the security of preference-based authentication. Proceedings of the 4th ACM workshop on Digital identity management. ACM, Alexandria, Virginia, USA (2008) 183. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R.: Graphical password authentication scheme for embedded platform. Journal of Artificial Intelligence 7, 161-171 (2014) 184. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security and its Applications 7, 1-16 (2013) 185. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home networks. In: Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, pp. 294-294. IEEE, (2008) 186. Jiang, L., Li, X., Cheng, L.L., Guo, D.: Identity authentication scheme of cloud storage for user anonymity via USB token. In: Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification, ASID. (2013) 187. Jiang, P., Wen, Q., Li, W., Jin, Z., Zhang, H.: An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers of Computer Science 9, 142-156 (2015) 188. Jiang, Q., Li, G.S., Ma, J.F.: Security flaws and improvement of an ID-based wireless authentication scheme with anonymity. Tongxin Xuebao/Journal on Communications 31, 209-216 (2010) 189. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 68, 1477-1491 (2013) 190. Jiang, Q., Ma, J., Ma, Z., Li, G.: A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 37, 1-8 (2013) 191. Jin, Z., Teoh, A.B.J., Thian, S.O., Tee, C.: Typing dynamics biometric authentication through fuzzy logic. In: Proceedings - International Symposium on Information Technology 2008, ITSim. (2008) 192. Jo, J., Kim, Y., Lee, S.: Mindmetrics: Identifying users without their login IDs. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2121-2126. (2014) 193. Joshi, S.S., Phoha, V.V.: Competition between SOM clusters to model user authentication system in computer networks. In: Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007. (2007) 194. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33, 168-176 (1990) 195. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based authentication system for smartphones. Security and Communication Networks (2014) 196. Kang, B.J., Park, K.R.: A new multi-unit iris authentication based on quality assessment and score level fusion for mobile phones. Machine Vision and Applications 21, 541-553 (2010) 197. Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Information Sciences 308, 72-93 (2015) 198. Karuppiah, M., Saravanan, R.: A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks. Wireless Personal Communications 84, 2055-2078 (2015) 199. Khakzar, M., Pourghassem, H.: Human authentication algorithm using spectral feature of retinal fundus image. International Journal of Tomography and Simulation 28, 23-38 (2015) 200. Khamis, M., Alt, F., Hassib, M., Zezschwitz, E.v., Hasholzner, R., Bulling, A.: GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016) 201. Khan, G.N., Moessner, M.: Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Networks 21, 565-580 (2015) 202. Khan, M.K., Alghathbar, K., Zhang, J.: Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommunication Systems 47, 227-234 (2011) 203. Khot, R.A., Srinathan, K., Khot, R.A.: NAPTune: fine tuning graphical authentication. Proceedings of the 3rd International Conference on Human Computer Interaction. ACM, Bangalore, India (2011) 204. Khot, R.A., Srinathan, K., Kumaraguru, P.: MARASIM: a novel jigsaw based authentication scheme using tagging. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada (2011) 205. Khoury, E., El Shafey, L., McCool, C., Günther, M., Marcel, S.: Bi-modal biometric authentication on mobile phones in challenging conditions. Image and Vision Computing 32, 1147-1160 (2014) 206. Kikuchi, H., Nagai, K., Ogata, W., Nishigaki, M.: Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Computing 14, 529-536 (2010) 207. Kim, S.K., Chung, M.G.: More secure remote user authentication scheme. Computer Communications 32, 1018-1021 (2009) 208. Kotropoulos, C., Tefas, A., Pitas, I.: Frontal face authentication using morphological elastic graph matching. IEEE Transactions on Image Processing 9, 555-560 (2000) 209. Kratz, S., Aumi, M.T.I.: AirAuth: a biometric authentication system using in-air hand gestures. CHI '14 Extended Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada (2014) 210. Krause, M.: A behavioral biometrics based authentication method for MOOC's that is robust against imitation attempts. Proceedings of the first ACM conference on Learning @ scale conference. ACM, Atlanta, Georgia, USA (2014) 211. Kuber, R., Sharma, S.: Toward tactile authentication for blind users. Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility. ACM, Orlando, Florida, USA (2010) 212. Kuber, R., Yu, W.: Feasibility study of tactile-based authentication. International Journal of Human-Computer Studies 68, 158-181 (2010) 213. Kulkarni, S., Raut, R.D., Dakhole, P.K.: A Novel Authentication System Based on Hidden Biometric Trait. Procedia Computer Science 85, 255-262 (2016) 214. Kulkarni, S., Raut, R.D., Dakhole, P.K.: Wavelet Based Modern Finger Knuckle Authentication. Procedia Computer Science 70, 649-657 (2015) 215. Kumar, A., Garg, S., Hanmandlu, M.: Biometric authentication using finger nail plates. Expert Systems with Applications 41, 373-386 (2014) 216. Kumar, A., Zhang, D.: Integrating palmprint with face for user authentication. In: Workshop on Multimodal User Authentication (MMUA 2003), pp. 107-112. Citeseer, (2003) 217. Kumar, A., Zhang, D.: Personal recognition using hand shape and texture. IEEE Transactions on Image Processing 15, 2454-2461 (2006) 218. Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 597-600 (2004) 219. Kumar, N., Kaur, K., Misra, S.C., Iqbal, R.: An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications 1-17 (2015) 220. Kumar, T.R., Raghavan, S.: PassPattern System (PPS): a pattern-based user authentication scheme. In: International Conference on Research in Networking, pp. 162-169. Springer, (2008) 221. Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Networking and Applications 1-14 (2015) 222. Kumari, S., Gupta, M.K., Kumar, M.: Cryptanalysis and security enhancement of Chen et al.’s remote user authentication scheme using smart card. Central European Journal of Computer Science 2, 60-75 (2012) 223. Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart card. International Journal of Communication Systems 29, 441-458 (2016) 224. Kumari, S., Om, H.: A modified remote authentication method with smartcards and check digits. In: Proceedings - 2014 International Conference on Data Science and Engineering, ICDSE 2014, pp. 206-209. (2014) 225. Kuribara, T., Shizuki, B., Tanaka, J.: Vibrainput: two-step PIN entry system based on vibration and visual information. CHI '14 Extended Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada (2014) 226. Kwon, T., Hong, J.: Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. IEEE Transactions on Information Forensics and Security 10, 278-292 (2015) 227. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770-772 (1981) 228. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53, 1683-1687 (2006) 229. Lee, C.-C., Hwang, M.-S., Yang, W.-P.: A flexible remote user authentication scheme using smart cards. SIGOPS Oper. Syst. Rev. 36, 46-52 (2002) 230. Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user authentication scheme using hash functions. SIGOPS Oper. Syst. Rev. 36, 23-29 (2002) 231. Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications 38, 13863-13870 (2011) 232. Lee, C.-Y., Lin, C.-H., Chang, C.-C.: An improved low computation cost user authentication scheme for mobile communication. In: 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp. 249-252. IEEE, (2005) 233. Lee, G., Jun-bin, C.A.O., Haitao, Y., Lili, D.: International Conference on Solid State Devices and Materials Science, April 1-2, 2012, MacaoEyebrows Identity Authentication Based on Wavelet Transform and Support Vector Machines. Physics Procedia 25, 1337-1341 (2012) 234. Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme for site authentication. In: Lecture Notes in Computer Science, pp. 111-116. (2005) 235. Lee, J., Park, H., Bang, G., Song, J.: POSTER: A Password-based Authentication by Splitting Roles of User Interface. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, Denver, Colorado, USA (2015) 236. Lee, N.Y., Chiu, Y.C.: Improved remote authentication scheme with smart card. Computer Standards and Interfaces 27, 177-180 (2005) 237. Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Symposium on cryptography and information security. (2006) 238. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improved efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 565-567 (2004) 239. Lee, T.-F.: An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-9 (2013) 240. Lee, Y., Chung, Y., Moon, K.: Secure face authentication framework in open networks. ETRI Journal 32, 950-960 (2010) 241. Lee, Y., Kim, J., Jeon, W., Won, D.: Design of a simple user authentication scheme using QR-code for mobile device. Information Technology Convergence, Secure and Trust Computing, and Data Management, pp. 241-247. Springer (2012) 242. Lee, Y.S., Kim, E., Jung, M.S.: A smart card based user authentication scheme for multi-server environment. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. (2011) 243. Leea, W.B., Chen, T.H., Sun, W.R., Ho, K.I.J.: An S/Key-like one-time password authentication scheme using smart cards for smart meter. In: Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014, pp. 281-286. (2014) 244. Leftheriotis, I.: User authentication in a multi-touch surface: a chord password system. CHI '13 Extended Abstracts on Human Factors in Computing Systems. ACM, Paris, France (2013) 245. Leicher, A., Schmidt, A.U., Shah, Y.: Smart OpenID: a smart card based OpenID protocol. In: IFIP International Information Security Conference, pp. 75-86. Springer, (2012) 246. León-Coca, J.M., Reina, D.G., Toral, S.L., Barrero, F., Bessis, N.: Authentication Systems Using ID Cards over NFC Links: The Spanish Experience Using DNIe. Procedia Computer Science 21, 91-98 (2013) 247. Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 55, 35-44 (2012) 248. Li, D., Sang, L., Yang, Y., Wu, Z.: Bimodal speaker identification using dynamic bayesian network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3338, pp. 577-585 (2004) 249. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security 13, 229-244 (2014) 250. Li, F., Wechsler, H.: Face authentication using recognition-by-parts, boosting and transduction. International Journal of Pattern Recognition and Artificial Intelligence 23, 545-573 (2009) 251. Li, L., Zhao, X., Xue, G.: Unobservable Re-authentication for Smartphones. In: NDSS. (2013) 252. Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Transactions on Neural Networks 12, 1498-1504 (2001) 253. Li, X., Liao, J., Kumari, S., Liang, W., Wu, F., Khan, M.K.: A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design. Wireless Personal Communications 85, 263-288 (2015) 254. Li, X., Niu, J., Khan, M.K., Liao, J.: Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards. In: Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, pp. 149-154. (2013) 255. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W.: An enhancement of a smart card authentication scheme for multi- server architecture. Wireless Personal Communications 80, 175-192 (2015) 256. Li, X., Niu, J., Liu, Y., Liao, J., Liang, W.: Robust dynamic ID-based remote user authentication scheme using smart cards. International Journal of Ad Hoc and Ubiquitous Computing 17, 254-264 (2014) 257. Li, X., Wang, K., Shen, J., Kumari, S., Wu, F., Hu, Y.: An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing 7, 427- 443 (2016) 258. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. Journal of medical systems 38, 1-8 (2014) 259. Li, X., Wen, Q., Zhang, H., Jin, Z.: An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management 23, 311-324 (2013) 260. Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: A secure image-based authentication scheme for mobile devices. In: Lecture Notes in Computer Science, pp. 751-760. (2005) 261. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. Journal of Computer and System Sciences 72, 727-740 (2006) 262. Liao, Y.-P., Hsiao, C.-M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks 18, 133-146 (2014) 263. Liao, Y.P., Hsiao, C.M.: A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols. Smart Innovation, Systems and Technologies, vol. 21, pp. 1-13 (2013) 264. Liaw, H.-T., Fan, S.-W., Wu, W.-C.: A simple password authentication using a polynomial. SIGOPS Oper. Syst. Rev. 38, 74-79 (2004) 265. Lin, C.-L., Hwang, T.: A password authentication scheme with secure password updating. Computers & Security 22, 68-72 (2003) 266. Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new strong-password authentication scheme using one-way hash functions. Journal of Computer and Systems Sciences International 45, 623-626 (2006) 267. Lin, I.-C., Chang, C.-C.: A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Information Sciences 179, 1269-1277 (2009) 268. Lin, M.-H., Chang, C.-C.: A secure one-time password authentication scheme with low-computation for mobile communications. SIGOPS Oper. Syst. Rev. 38, 76-84 (2004) 269. Lin, T.H., Shih, W.P., Chen, W.C., Ho, W.Y.: 3D face authentication by mutual coupled 3D and 2D feature extraction. Proceedings of the 44th annual Southeast regional conference. ACM, Melbourne, Florida (2006) 270. Liou, J.C., Conway, J.: A single-factor dynamic authentication for computer systems with touch screens. In: 23rd International Conference on Software Engineering and Data Engineering, SEDE 2014, pp. 31-36. (2014) 271. Liu, J., Yu, F.R., Lung, C.H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications 8, 806-815 (2009) 272. Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a single tri-axis accelerometer. Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, Bonn, Germany (2009) 273. Liu, J.Y., Zhou, A.M., Gao, M.X.: A new mutual authentication scheme based on nonce and smart cards. Computer Communications 31, 2205-2209 (2008) 274. Lo, N., Tsai, J.: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings. IEEE Transactions on Intelligent Transportation Systems (2015) 275. Lo, N.-W., Yeh, K.-H.: An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system. In: International Conference on Embedded and Ubiquitous Computing, pp. 43-56. Springer, (2007) 276. Lo, N.W., Yeh, K.H.: Mutual RFID authentication scheme for resource-constrained tags. Journal of Information Science and Engineering 26, 1875-1889 (2010) 277. Lopez, N., Rodriguez, M., Fellegi, C., Long, D., Schwarz, T.: Even or Odd: A Simple Graphical Authentication System. IEEE Latin America Transactions 13, 804-809 (2015) 278. Loutrel, M., Urien, P., Gaïti, D.: Authentication in wireless networks: state of the art and integration with smart card. Annales des Télécommunications 59, 130-148 (2004) 279. Lu, Y., Wu, X., Yang, X.: A secure anonymous authentication scheme for wireless communications using smart cards. International Journal of Network Security 17, 237-245 (2015) 280. Luca, A.D., Harbach, M., Zezschwitz, E.v., Maurer, M.-E., Slawik, B.E., Hussmann, H., Smith, M.: Now you see me, now you don't: protecting smartphone authentication from shoulder surfers. Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014) 281. Luca, A.D., Weiss, R., Hu, H., mann, An, X.: Eyepass - eye-stroke authentication for public terminals. CHI '08 Extended Abstracts on Human Factors in Computing Systems. ACM, Florence, Italy (2008) 282. Luca, A.D., Zezschwitz, E.v., Hu, H., mann: Vibrapass: secure authentication based on shared lies. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Boston, MA, USA (2009) 283. Luca, A.D., Zezschwitz, E.v., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., Langheinrich, M.: Back- of-device authentication on smartphones. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Paris, France (2013) 284. Lumini, A., Nanni, L.: An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers. Neurocomputing 69, 1706-1710 (2006) 285. Maio, D., Nanni, L.: Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004. Neurocomputing 69, 242-249 (2005) 286. Maiorana, E., Campisi, P., Gonz, N., lez, C., Neri, A.: Keystroke dynamics authentication for mobile phones. Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, TaiChung, Taiwan (2011) 287. Malempati, S., Mogalla, S.: Intrusion prevention by native language password authentication scheme. Communications in Computer and Information Science, vol. 196 CCIS, pp. 239-248 (2011) 288. Manasa, N.L., Govardhan, A., Satyanarayana, C.H.: Fusion of multiple biometric traits: Fingerprint, palmprint and iris. Intelligent Systems Reference Library, vol. 70, pp. 287-320 (2014) 289. Mandalapu, A., Daffney Deepa, V., Raj, L.D., Anish Dev, J.: An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies. In: Computing and Communication (IEMCON), 2015 International Conference and Workshop on, pp. 1-6. (2015) 290. Maqsood, S., Chiasson, S., Girouard, A.: POSTER: Passwords on flexible display devices. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, Berlin, Germany (2013) 291. Marcel, S., Millán, J.d.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 743-752 (2007) 292. Martínez-Peláez, R., Rico-Novella, F., Forné, J., Velarde-Alvarado, P.: Security Improvement of Two Dynamic ID- based Authentication Schemes by Sood-Sarje-Singh. Journal of Applied Research and Technology 11, 755-763 (2013) .s low-frequency fits the continuous authentication׳Matsuyama, Y., Shozawa, M., Yokote, R.: Brain signal .293 Neurocomputing 164, 137-143 (2015) 294. Medikonda, J., Madasu, H., B.K, P.: Information set based gait authentication system. Neurocomputing 295. Meng, Y., Wong, D.S., Kwok, L.-F.: Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. Proceedings of the 29th Annual ACM Symposium on Applied Computing. ACM, Gyeongju, Republic of Korea (2014) 296. Meng, Y., Wong, D.S., Schlegel, R.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: International Conference on Information Security and Cryptology, pp. 331-350. Springer, (2012) 297. Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings - 2012 IEEE 7th International Conference on Networking, Architecture and Storage, NAS 2012, pp. 39-48. (2012) 298. Mihajlov, M., Jerman-Blažič, B.: On designing usable and secure recognition-based graphical authentication mechanisms. Interacting with Computers 23, 582-593 (2011) 299. Mir, O., Munilla, J., Kumari, S.: Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Networking and Applications 1-13 (2015) 300. Mir, O., Nikooghadam, M.: A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services. Wireless Personal Communications 83, 2439-2461 (2015) 301. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 9, 171-192 (2016) 302. Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K.: Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-12 (2014) 303. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A.: Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems 38, 1- 11 (2014) 304. Mishra, D.: Design and Analysis of a Provably Secure Multi-server Authentication Scheme. Wireless Personal Communications 86, 1095-1119 (2016) 305. Mishra, R., Barnwal, A.K.: A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-10 (2015) 306. Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time continuous iris recognition for authentication using an eye tracker. Proceedings of the 2012 ACM conference on Computer and communications security. ACM, Raleigh, North Carolina, USA (2012) 307. Mock, P., Edelmann, r., Schilling, A., Rosenstiel, W.: User identification using raw sensor data from typing on interactive displays. Proceedings of the 19th international conference on Intelligent User Interfaces. ACM, Haifa, Israel (2014) 308. Mondal, A., Roy, K., Bhattacharya, P.: Secure and simplified access to home appliances using Iris recognition. In: Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009. CIB 2009. IEEE Workshop on, pp. 22-29. (2009) 309. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM conference on Computer and communications security, pp. 48-56. ACM, (1997) 310. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Generation computer systems 16, 351-359 (2000) 311. Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems. Procedia Computer Science 32, 198-206 (2014) 312. Mudholkar, S.S., Shende, P.M., Sarode, M.V.: Biometrics authentication technique for intrusion detection systems using fingerprint recognition. International Journal of Computer Science, Engineering and Information Technology 2, 57-65 (2012) 313. Nader, J., Alsadoon, A., Prasad, P.W.C., Singh, A.K., Elchouemi, A.: Designing Touch-Based Hybrid Authentication Method for Smartphones. Procedia Computer Science 70, 198-204 (2015) 314. Nakakuni, M., Dozono, H., Tokushima, H., Noguchi, Y.: Application of self organizing maps for the integrated authentication using keystroke timings and handwritten symbols. WSEAS Transactions on Information Science and Applications 4, 413-420 (2007) 315. Nam, J., Choo, K.K.R., Paik, J.: A provably-anonymous authentication scheme for roaming services. International Journal of Security and its Applications 10, 193-204 (2016) 316. Nam, J., Kim, M., Paik, J., Lee, Y., Won, D.: A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14, 21023-21044 (2014) 317. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, 299- 302 (2007) 318. Nanni, L., Lumini, A.: Human authentication featuring signatures and tokenised random numbers. Neurocomputing 69, 858-861 (2006) 319. Nanni, L., Lumini, A.: Random subspace for an improved BioHashing for face authentication. Pattern Recognition Letters 29, 295-300 (2008) 320. Nayak, A., Bansode, R.: Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points. Procedia Computer Science 79, 553-560 (2016) 321. Nguyen, C.X., Huang, H.-H., Kawagoe, K.: POSTER: Graphical password using object-based image ranking. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, Berlin, Germany (2013) 322. Nguyen, T.A.T., Dang, T.K.: Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol. In: 2015 International Conference on Advanced Computing and Applications (ACOMP), pp. 1-6. (2015) 323. Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., Olivier, P.: A security assessment of tiles: a new portfolio-based graphical authentication system. CHI '12 Extended Abstracts on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012) 324. Nigam, A., Gupta, P.: Designing an accurate hand biometric based authentication system fusing finger knuckleprint and palmprint. Neurocomputing 151, 1120-1132 (2015) 325. Nigam, A., Tiwari, K., Gupta, P.: Multiple texture information fusion for finger-knuckle-print authentication system. Neurocomputing 188, 190-205 (2016) 326. Niinuma, K., Jain, A.K.: Continuous user authentication using temporal information. In: SPIE Defense, Security, and Sensing, pp. 76670L-76670L-76611. International Society for Optics and Photonics, (2010) 327. Niinuma, K., Park, U., Jain, A.K.: Soft Biometric Traits for Continuous User Authentication. IEEE Transactions on Information Forensics and Security 5, 771-780 (2010) 328. Nikolić, D., Vuksanović, B., Nguyen, C.: Attribute selection and intrusion detection for knowledge-based authentication systems. In: Proceedings of the 12th IASTED International Conference on Artificial Intelligence and Soft Computing, ASC 2008, pp. 202-207. (2008) 329. Nosseir, A., Connor, R., Renaud, K.: Question-based group authentication. Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments. ACM, Sydney, Australia (2006) 330. Ntalianis, K., Tsapatsoulis, N., Drigas, A.: Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions. EURASIP Journal on Information Security 2011, 1-12 (2011) 331. Odelu, V., Das, A.K., Goswami, A.: An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems. Wireless Personal Communications 84, 2571-2598 (2015) 332. O'Gorman, L., Bagga, A., Bentley, J.: Query-directed passwords. Computers & Security 24, 546-560 (2005) 333. O'Gorman, L., Sammon, M.J., Bentley, J., Skiba, D.J., Erhart, G.W.: Options for spoken human-computer authentication in mobile environments. In: Proceedings of the 3rd IASTED International Conference on Human- Computer Interaction, HCI 2008, pp. 230-235. (2008) 334. Onali, T., Ginesu, G.: Transmission-efficient image-based authentication for mobile devices. In: International Workshop on Visual Content Processing and Representation, pp. 22-28. Springer, (2005) 335. Ota, H., Aoyama, S., Watanabe, R., Ito, K., Miyake, Y., Aoki, T.: Implementation and evaluation of a remote authentication system using touchless palmprint recognition. Multimedia Systems 19, 117-129 (2013) 336. Ouda, O., Tsumura, N., Nakaguchi, T.: BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes. IEICE Transactions on Information and Systems E93-D, 1878-1888 (2010) 337. Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iriscodes. In: Proceedings - International Conference on Pattern Recognition, pp. 882-885. (2010) 338. Ouyang, H., Lee, T.: A new lip feature representation method for video-based bimodal authentication. Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop - Volume 57. Australian Computer Society, Inc., Sydney, Australia (2006) 339. Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems 18, 59-66 (2008) 340. Park, M., Kita, Y., Aburada, K., Okazaki, N.: Proposal of a puzzle authentication method with shoulder-surfing attack resistance. In: Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS 2014, pp. 495-500. (2014) 341. Part, Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi- server authentication with key agreement scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7335 LNCS, pp. 391-406 (2012) 342. Part, Kim, J., Jim, S.: Authentication and key agreement method for home networks using a smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4705 LNCS, pp. 655-665 (2007) 343. Part, Yoo, S., Yoo, J., Park, P., Ryou, J.: A lightweight and stable authentication method for the internet access control in smartphones. Communications in Computer and Information Science, vol. 251 CCIS, pp. 331-342 (2011) 344. Patel, A., Kalajdzic, K., Golafshan, L., Taghavi, M.: Design and implementation of a zero-knowledge authentication framework for Java Card. International Journal of Information Security and Privacy 5, 1-18 (2011) 345. Pathan, A.-S.K., Hong, C.S.: Bilinear-pairing-based remote user authentication schemes using smart cards. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM, Suwon, Korea (2009) 346. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., van der Lubbe, J.C.A.: Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence 24, 1061-1069 (2011) 347. Peris-Lopez, P., Lim, T.-L., Li, T.: Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework. In: International Conference on Embedded and Ubiquitous Computing, 2008. EUC'08. IEEE/IFIP, pp. 159-166. IEEE, (2008) 348. Phan, D.T., Truong, T.T., Tran, M.T., Duong, A.D.: Two-way biometrics-based authentication scheme on mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8860, pp. 177-190 (2014) 349. Phua, K., Chen, J., Dat, T.H., Shue, L.: Heart sound as a biometric. Pattern Recognition 41, 906-919 (2008) 350. Pintor Maestre, D.: QRP: An improved secure authentication method using QR codes. (2012) 351. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Robust Smart Card Authentication Scheme for Multi-server Architecture. Wireless Personal Communications 72, 729-745 (2013) 352. Pishva, D.: Spectroscopic Approach for Aliveness Detection in Biometrics Authentication. In: 2007 41st Annual IEEE International Carnahan Conference on Security Technology, pp. 133-137. IEEE, (2007) 353. Podilchuk, C., Barinov, L., Hulbert, W., Jairaj, A.: Face recognition in a tactical environment. In: MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pp. 900-905. (2010) 354. Preuveneers, D., Joosen, W.: SmartAuth: dynamic context fingerprinting for continuous user authentication. Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca, Spain (2015) 355. Qi, M., Lu, Y., Li, J., Li, X., Kong, J.: User-specific iris authentication based on feature selection. In: Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008, pp. 1040-1043. (2008) 356. Qiao, M., Zhang, S., Sung, A.H., Liu, Q.: A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics. In: Proceedings - International Computer Software and Applications Conference, pp. 494-503. (2015) 357. Rajasekaran, M.P., Suresh, M., Dhanasekaran, U.: Multimodal biometric recognition using sclera and fingerprint based on ANFIS. In: 2014 International Conference on Recent Trends in Information Technology, ICRTIT 2014. (2014) 358. Ramanathan, V., Wechsler, H.: Robust human authentication using appearance and holistic anthropometric features. Pattern Recognition Letters 31, 2425-2435 (2010) 359. Ranjan, P., Om, H.: An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem. Wireless Personal Communications 1-28 (2016) 360. Rathgeb, C., Uhl, A.: Secure iris recognition based on local intensity variations. In: International Conference Image Analysis and Recognition, pp. 266-275. Springer, (2010) 361. Ray, P.P.: Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices. International journal of computer trends and technology 3, 235-241 (2012) 362. Renaud, K.: A visuo-biometric authentication mechanism for older users. People and Computers XIX—The Bigger Picture, pp. 167-182. Springer (2006) 363. Revett, K.: A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of Control, Automation and Systems 7, 7-15 (2009) 364. Ribeiro, M.A.C., Scharcanski, J., Schuck, A.: An user identity authentication scheme adaptive to changes in face appearance. In: Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE, pp. 1-5. (2011) 365. Ritter, D., Schaub, F., Walch, M., Weber, M.: MIBA: multitouch image-based authentication on smartphones. CHI '13 Extended Abstracts on Human Factors in Computing Systems. ACM, Paris, France (2013) 366. Rohith, G., Bhuvaneswari, M., Kannaki, S.: Optimization of dynamic resistance against malicious attacks & collusion through enhanced authentication schemes in application to smartcard. In: 2015 IEEE 7th National Conference on Computing, Communication and Information Systems, NCCCIS 2015, pp. 5-10. (2015) 367. Roth, V., Schmidt, P., G, B., ldenring: The IR ring: authenticating users' touches on a multi-touch display. Proceedings of the 23nd annual ACM symposium on User interface software and technology. ACM, New York, New York, USA (2010) 368. Ryu, E.-K., Kim, D.-S., Yoo, K.-Y.: On Elliptic Curve Based Untraceable RFID Authentication Protocols. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, Portland, Oregon, USA (2015) 369. Sadqi, Y., Asimi, A., Asimi, Y.: A Cryptographic Mutual Authentication Scheme for Web Applications. arXiv preprint arXiv:1412.2908 (2014) 370. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012) 371. Sae-Bae, N., Jakobsson, M.: Hand authentication on multi-touch tablets. Proceedings of the 15th Workshop on Mobile Computing Systems and Applications. ACM, Santa Barbara, California (2014) 372. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Continuous user authentication using multi-modal biometrics. Computers & Security 53, 234-246 (2015) 373. Safie, S.I., Soraghan, J.J., Petropoulakis, L.: Electrocardiogram (ECG) biometric authentication using pulse active ratio (PAR). IEEE Transactions on Information Forensics and Security 6, 1315-1322 (2011) 374. Sagar, K., Waghmare, V.: “Measuring the Security and Reliability of Authentication of Social Networking Sites”. Procedia Computer Science 79, 668-674 (2016) 375. Sakata, K., Maeda, T., Matsushita, M., Sasakawa, K., Tamaki, H.: Fingerprint authentication based on matching scores with other data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3832 LNCS, pp. 280-286 (2006) 376. Samangouei, P., Patel, V.M., Chellappa, R.: Facial Attributes for Active Authentication on Mobile Devices. Image and Vision Computing (2016) 377. Sandirigama, M., Shimizu, A.: Simple and secure password authentication protocol (SAS). IEICE Transactions on Communications 83, 1363-1365 (2000) 378. Sarier, N.D.: A new approach for biometric template storage and remote authentication. In: International Conference on Biometrics, pp. 909-918. Springer, (2009) 379. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem. Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, Kochi, India (2015) 380. Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Florence, Italy (2008) 381. Sathish Babu, B., Venkataram, P.: Transaction based authentication scheme for mobile communication: A cognitive agent based approach. In: Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS 2007; Abstracts and CD-ROM. (2007) 382. Schneegass, S., Oualil, Y., Bulling, A.: SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016) 383. Shanmugapriya, D., Padmavathi, G.: A wrapper based feature subset selection using ACO-ELM-ANP and GA-ELM- ANP approaches for keystroke dynamics authentication. In: International Conference on Signal Processing, Image Processing and Pattern Recognition 2013, ICSIPR 2013. (2013) 384. Shen, H., Gao, C., He, D., Wu, L.: New biometrics-based authentication scheme for multi-server environment in critical systems. Journal of Ambient Intelligence and Humanized Computing 6, 825-834 (2015) 385. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 49, 414-416 (2003) 386. Shen, Z.-h.: A new modified remote user authentication scheme using smart cards. Applied Mathematics-A Journal of Chinese Universities 23, 371-376 (2008) 387. Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35, 826-833 (2005) 388. Shi, P., Zhu, B., Youssef, A.: A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 237-241. (2009) 389. Shi, W.-M., Yang, Y.-G., Zhou, Y.-H.: Quantum signature-masked authentication schemes. Optik - International Journal for Light and Electron Optics 126, 3544-3548 (2015) 390. Shieh, W.G., Wang, M.T.: Improvement of chen et al.’s fingerprint biometric remote authentication scheme. ICIC Express Letters 9, 1571-1575 (2015) 391. Shimizu, A., Horioka, T., Inagaki, H.: A password authentication method for contents communications on the Internet. IEICE transactions on communications 81, 1666-1673 (1998) 392. Shimizu, A.: A dynamic password authentication method using a one‐way function. Systems and computers in Japan 22, 32-40 (1991) 393. Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: A smarter geolocation-based authentication scheme. Security and Communication Networks 8, 3927-3938 (2015) 394. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on, pp. 1-6. (2015) 395. Shuren, L., Qiuyan, Z., Chao, C., Yiqi, D.: A unidirectional one-time password authentication scheme without counter desynchronization. In: 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, pp. 361-364. (2009) 396. Singh, Y.N., Singh, S.K., Gupta, P.: Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system. Pattern Recognition Letters 33, 1932-1941 (2012) 397. Sodhi, B.: Using dropped call as an authentication factor. In: Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, pp. 2031-2035. (2015) 398. Somayaji, A., Mould, D., Brown, C.: Towards narrative authentication: or, against boring authentication. Proceedings of the 2013 workshop on New security paradigms workshop. ACM, Banff, Alberta, Canada (2013) 399. Sreeja, C.S., Misbahuddin, M.: A secure image-based authentication scheme employing DNA crypto and steganography. In: ACM International Conference Proceeding Series, pp. 595-601. (2015) 400. Sreeramareddy, L., Miao, S., Feng, J.H.: Investigating gesture-based password: usability and vulnerability to shoulder-surfing attacks. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems. ACM, Towson, Maryland (2014) 401. Srinivasa, K.G., Gosukonda, S.: Continuous multimodal user authentication: coupling hard and soft biometrics with support vector machines to attenuate noise. CSI Transactions on ICT 2, 129-140 (2014) 402. Sriram, J.C., Shin, M., Choudhury, T., Kotz, D.: Activity-aware ECG-based patient authentication for remote health monitoring. Proceedings of the 2009 international conference on Multimodal interfaces. ACM, Cambridge, Massachusetts, USA (2009) 403. Srisuk, S., Petrou, M., Kurutach, W., Kadyrov, A.: A face authentication system using the trace transform. Pattern Analysis and Applications 8, 50-61 (2005) 404. Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN: Secure mobile transaction authentication. In: International Conference on Availability, Reliability and Security, 2009. ARES'09., pp. 578-583. IEEE, (2009) 405. Sun, H.-M.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 958-961 (2000) 406. Suoranta, S., Andrade, A., Aura, T.: Strong authentication with mobile phone. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7483 LNCS, pp. 70-85 (2012) 407. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. Proceedings of the 7th workshop on Multimedia and security. ACM, New York, NY, USA (2005) 408. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations in feature vector structure in keystroke dynamics authentication systems. Software Quality Journal 24, 137-157 (2016) 409. Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. In: International Conference on Mobile Human-Computer Interaction, pp. 347-351. Springer, (2003) 410. Takada, T., Kokubun, Y.: Extended PIN authentication scheme allowing multi-touch key input. In: ACM International Conference Proceeding Series, pp. 307-310. (2013) 411. Takada, T.: FakePointer: An authentication scheme for improving security against peeping attacks using video cameras. In: Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008, pp. 395-400. (2008) 412. Tamrakar, S., Ekberg, J.-E., Asokan, N.: Identity verification schemes for public transport ticketing with NFC phones. Proceedings of the sixth ACM workshop on Scalable trusted computing. ACM, Chicago, Illinois, USA (2011) 413. Tan, Z.: Analysis and improvement of a user authentication improved protocol. Journal of Networks 5, 622-630 (2010) 414. Tan, Z.: Improvement on a password authentication scheme for multi-server environments. Journal of Convergence Information Technology 6, 218-228 (2011) 415. Tang, Y., Hidenori, N., Urano, Y.: User authentication on smart phones using a data mining method. In: 2010 International Conference on Information Society, i-Society 2010, pp. 173-178. (2010) 416. Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: A multiple layer fusion approach on keystroke dynamics. Pattern Analysis and Applications 14, 23-36 (2011) 417. Thiranant, N., Lee, H.: A Design of e-Healthcare Authentication Framework with QR Code. International Journal of Security and Its Applications 8, 79-86 (2014) 418. Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of GeoPass: a geographic location- password scheme. Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United Kingdom (2013) 419. Thorpe, J., Oorschot, P.C.v., Somayaji, A.: Pass-thoughts: authenticating with our minds. Proceedings of the 2005 workshop on New security paradigms. ACM, Lake Arrowhead, California (2005) 420. Topkara, U., Atallah, M.J., Topkara, M.: Passwords decay, words endure: secure and re-usable multiple password mnemonics. Proceedings of the 2007 ACM symposium on Applied computing. ACM, Seoul, Korea (2007) 421. Traore, I., Woungang, I., Obaidat, M.S., Nakkabi, Y., Lai, I.: Online risk-based authentication using behavioral biometrics. Multimedia Tools and Applications 71, 575-605 (2014) 422. Trojahn, M., Ortmeier, F.: Biometric authentication through a virtual keyboard for smartphones. International Journal of Computer Science & Information Technology 4, 1 (2012) 423. Truong, T.T., Tran, M.T., Duong, A.D.: Modified efficient and secure dynamic ID-based user authentication scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7804 LNCS, pp. 409-415 (2013) 424. Tsai, J.-L., Lo, N.-W., Wu, T.-C.: A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks. Wireless Personal Communications 71, 1977-1988 (2013) 425. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security 27, 115-121 (2008) 426. Tsalakanidou, F., Malassiotis, S., Strintzis, M.G.: Exploitation of 3D images for face authentication under pose and illumination variations. In: 3D Data Processing, Visualization and Transmission, 2004. 3DPVT 2004. Proceedings. 2nd International Symposium on, pp. 50-57. (2004) 427. Tseng, Y.-M., Wu, T.-Y., Wu, J.-D.: A pairing-based user authentication scheme for wireless clients with smart cards. Informatica 19, 285-302 (2008) 428. Tsuchiya, T., Kihara, M., Berena, A.J.P.: Transmission time-based authentication scheme using 3G mobile device for DRM system. In: 2009 IEEE International Frequency Control Symposium Joint with the 22nd European Frequency and Time Forum, pp. 706-710. (2009) 429. Tullis, T.S., Tedesco, D.P.: Using personal photos as pictorial passwords. CHI '05 Extended Abstracts on Human Factors in Computing Systems. ACM, Portland, OR, USA (2005) 430. Umar, M.S., Rafiq, M.Q.: Select-to-Spawn: A novel recognition-based graphical user authentication scheme. In: 2012 IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2012. (2012) 431. Usha, K., Ezhilarasan, M.: Robust personal authentication using finger knuckle geometric and texture features. Ain Shams Engineering Journal (2016) 432. Vaidya, B., Park, J.H., Yeo, S.-S., Rodrigues, J.J.P.C.: Robust one-time password authentication scheme using smart card for home network environment. Computer Communications 34, 326-336 (2011) 433. Van, H.T., Tat, P.Q., Le, T.H.: Palmprint verification using GridPCA for Gabor features. Proceedings of the Second Symposium on Information and Communication Technology. ACM, Hanoi, Vietnam (2011) 434. Varenhorst, C., Kleek, M., Rudolph, L.: Passdoodles: A lightweight authentication method. Research Science Institute (2004) 435. Vasuhi, S., Vaidehi, V., Babu, N.T.N., Treesa, T.M.: An efficient multi-modal biometric person authentication system using Fuzzy Logic. In: 2010 2nd International Conference on Advanced Computing, ICoAC 2010, pp. 74-81. (2010) 436. Venkat, I., De Wilde, P.: Robust Gait Recognition by Learning and Exploiting Sub-gait Characteristics. International Journal of Computer Vision 91, 7-23 (2011) 437. Venkataram, P., Babu, B.S.: An authentication scheme for ubiquitous commerce: A cognitive agents based approach. In: 2008 IEEE Network Operations and Management Symposium Workshops - NOMS 08, pp. 248-256. (2008) 438. Vijilious, M.A.L., Ganapathy, S., Bharathi, V.S.: Palmprint feature extraction approach using nonsubsampled contourlet transform and orthogonal moments. Proceedings of the International Conference on Advances in Computing, Communications and Informatics. ACM, Chennai, India (2012) 439. Vo, D.L., Kim, K.: Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC. In: International Conference on Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP, pp. 144-147. (2007) 440. Vorugunti, C.S., Indukuri, S.S.V.: A Secure and Efficient BiometricAuthentication as a Service for Cloud Computing. Proceedings of the 6th IBM Collaborative Academia Research Exchange Conference (I-CARE) on I- CARE 2014. ACM, Bangalore, India (2014) 441. W, A., jtowicz, Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Personal Ubiquitous Comput. 20, 195-207 (2016) 442. Wan, J., Bai, Z., Bai, X.: Secure group identity authentication based on non-perfect secret sharing scheme. In: ICALIP 2012 - 2012 International Conference on Audio, Language and Image Processing, Proceedings, pp. 149-154. (2012) 443. Wang, B., Ma, M.: A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme. Wireless Personal Communications 68, 361-378 (2013) 444. Wang, B.J., Zhang, H.G., Wang, Y.H.: Secure password-based authentication scheme with anonymous identity without smart cards. Tongxin Xuebao/Journal on Communications 29, 70-75 (2008) 445. Wang, C., Li, Y., Song, X.: Video-to-video face authentication system robust to pose variations. Expert Systems with Applications 40, 722-735 (2013) 446. Wang, D., Ma, C.-g.: Cryptanalysis of a remote user authentication scheme for mobile client–server environment based on ECC. Information Fusion 14, 498-503 (2013) 447. Wang, F., Han, J.: Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electronics Review 17, 59-64 (2009) 448. Wang, J., Li, Y., Ao, X., Wang, C., Zhou, J.: Multi-modal biometric authentication fusing iris and palmprint based on GMM. In: 2009 IEEE/SP 15th Workshop on Statistical Signal Processing, pp. 349-352. IEEE, (2009) 449. Wang, K., Zhang, Y., Yuan, Z., Zhuang, D.: Hand vein recognition based on multi supplemental features of multi- classifier fusion decision. In: 2006 International Conference on Mechatronics and Automation, pp. 1790-1795. IEEE, (2006) 450. Wang, P., Ku, C.-C., Wang, T.C.: A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security. Recent Application in Bio-metrics 183-196 (2011) 451. Wang, S.-Q., Wang, J.-Y., Li, Y.-Z.: The Web Security Password Authentication based the Single-block Hash Function. IERI Procedia 4, 2-7 (2013) 452. Wang, X., Guo, F., Ma, J.-f.: User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digital Signal Processing 22, 707-712 (2012) 453. Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 29, 507-512 (2007) 454. Wang, Y., Plataniotis, K.: Face based biometric authentication with changeable and privacy preservable templates. In: Biometrics Symposium, 2007, pp. 1-6. IEEE, (2007) 455. Wang, Y., Plataniotis, K.: Face based biometric authentication with changeable and privacy preserving templates. In: Biometric Symposium, BSYM. (2007) 456. Wang, Z., Huo, Z., Shi, W.: A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems. Journal of Medical Systems 39, 1-8 (2014) 457. Wang, Z., Jing, J., Li, L.: Time evolving graphical password for securing mobile devices. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, Hangzhou, China (2013) 458. Watanabe, Y., Houryu, Fujita, T.: Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone. Procedia Computer Science 22, 1319-1327 (2013) 459. Wei, J., Hu, X., Liu, W.: Two‐factor authentication scheme using attribute and password. International Journal of Communication Systems (2014) 460. Weiss, R., Luca, A.D.: PassShapes: utilizing stroke based authentication to increase password memorability. Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges. ACM, Lund, Sweden (2008) 461. Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Computers & Electrical Engineering 38, 381-387 (2012) 462. Wen, F., Susilo, W., Yang, G.: A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks. Wireless Personal Communications 73, 993-1004 (2013) 463. Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.-C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. Proceedings of the working conference on Advanced visual interfaces. ACM, Venezia, Italy (2006) 464. Winkler, C., Gugenheimer, J., Luca, A.D., Haas, G., Speidel, P., Dobbelstein, D., Rukzio, E.: Glass Unlock: Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 465. Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), pp. 8 pp. IEEE, (2006) 466. Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. Journal of Ambient Intelligence and Humanized Computing 1-16 (2016) 467. Wu, F., Xu, L.: Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 37, 1-9 (2013) 468. Wu, J.S., Lin, W.C., Lin, C.T., Wei, T.E.: Smartphone continuous authentication based on keystroke and gesture profiling. In: Security Technology (ICCST), 2015 International Carnahan Conference on, pp. 191-197. (2015) 469. Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS workshop on usable privacy and security software. (2004) 470. Wu, S., Pu, Q., Kang, F.: Practical authentication scheme for SIP. Peer-to-Peer Networking and Applications 6, 61- 74 (2013) 471. Wu, S., Zhu, Y., Pu, Q.: Robust smart‐cards‐based user authentication scheme with user anonymity. Security and Communication Networks 5, 236-248 (2012) 472. Wu, S.-T., Chieu, B.-C.: A user friendly remote authentication scheme with smart cards. Computers & Security 22, 547-550 (2003) 473. Wu, T.-S., Lee, M.-L., Lin, H.-Y., Wang, C.-Y.: Shoulder-surfing-proof graphical password authentication scheme. International Journal of Information Security 13, 245-254 (2014) 474. Wu, Z.-Y., Chen, L., Wu, J.-C.: A Reliable RFID Mutual Authentication Scheme for Healthcare Environments. Journal of Medical Systems 37, 1-9 (2013) 475. Xi, K., Hu, J., Han, F.: Mobile device access control: An improved correlation based face authentication scheme and its Java ME application. Concurrency Computation Practice and Experience 24, 1066-1085 (2012) 476. Xiaojun, C., Zicheng, W., Yiguo, P., Jinqiao, S.: A Continuous Re-Authentication Approach Using Ensemble Learning. Procedia Computer Science 17, 870-878 (2013) 477. Xiong, J., Xiong, J., Claramunt, C.: A spatial entropy-based approach to improve mobile risk-based authentication. Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis. ACM, Dallas/Fort Worth, Texas (2014) 478. Xu, F., Han, S., Wang, Y., Zhang, J., Li, Y.: QRToken: Unifying Authentication Framework to Protect User Online Identity. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, pp. 368- 373. (2015) 479. Yakovlev, V.A., Arkhipov, V.V.: User authentication based on the chess graphical password scheme resistant to shoulder surfing. Automatic Control and Computer Sciences 49, 803-812 (2015) 480. Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Designing leakage-resilient password entry on touchscreen mobile devices. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, Hangzhou, China (2013) 481. Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Leakage-resilient password entry: Challenges, design, and evaluation. Computers & Security 48, 196-211 (2015) 482. Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P.: A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-6 (2013) 483. Yang, S., Schaumont, P., Verbauwhede, I.: Microcoded coprocessor for embedded secure biometric authentication systems. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. ACM, Jersey City, NJ, USA (2005) 484. Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp. v/609-v/612 Vol. 605. IEEE, (2005) 485. Yang, T.-C., Lo, N.-W., Liaw, H.-T., Wu, W.C.: A secure smart card authentication and authorization framework using in multimedia cloud. Multimedia Tools and Applications 1-23 (2016) 486. Yang, W., Ma, G., Zhou, F., Liao, Q.: Feature-level fusion of finger veins and finger dorsal texture for personal authentication based on orientation selection. IEICE Transactions on Information and Systems E96-D, 1371-1373 (2014) 487. Yang, W., Yu, X., Liao, Q.: Personal authentication using finger vein pattern and finger-dorsa texture fusion. In: MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums, pp. 905-908. (2009) 488. Yang, X., Han, F.: Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications. Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia. ACM, Kaohsiung, Taiwan (2014) 489. Yao, L., Kong, X., Wu, G., Fan, Q., Lin, C.: A privacy-preserving authentication scheme using biometrics for pervasive computing environments. Journal of Electronics (China) 27, 68-78 (2010) 490. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W., Zou, D.: Cloud authentication based on anonymous one-time password. Ubiquitous Information Technologies and Applications, pp. 423-431. Springer (2013) 491. Yeh, K.-H.: A lightweight authentication scheme with user untraceability. Frontiers of Information Technology & Electronic Engineering 16, 259-271 (2015) 492. Yeh, T.-C., Wu, C.-H., Tseng, Y.-M.: Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34, 337-341 (2011) 493. Yeom, S.-K., Suk, H.-I., Lee, S.-W.: Person authentication from neural activity of face-specific visual self- representation. Pattern Recognition 46, 1159-1169 (2013) 494. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Computers and Security 24, 50-56 (2005) 495. Yoon, E.-J., Yoo, K.-Y., Ha, K.-S.: A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering 37, 356-364 (2011) 496. Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4537 LNCS, pp. 612-623 (2007) 497. Yoon, E.-J., Yoo, K.-Y.: More efficient and secure remote user authentication scheme using smart cards. In: 11th International Conference on Parallel and Distributed Systems (ICPADS'05), pp. 73-77. IEEE, (2005) 498. Yu, Z., Liu, B.W., Shen, G.C.: Application of the hybrid arbitrated digital signature scheme in CSCW. In: 7th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2011. (2011) 499. Zack, R.S., Tappert, C.C., Cha, S.-H.: Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method. In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2010, pp. 1-6. IEEE, (2010) 500. Zezschwitz, E.v., Koslow, A., Luca, A.D., Hussmann, H.: Making graphic-based authentication secure against smudge attacks. Proceedings of the 2013 international conference on Intelligent user interfaces. ACM, Santa Monica, California, USA (2013) 501. Zezschwitz, E.v., Luca, A.D., Brunkow, B., Hussmann, H.: SwiPIN: Fast and Secure PIN-Entry on Smartphones. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 502. Zhan, J., Fang, X.: Authentication using multi-level social networks. In: International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management, pp. 35-49. Springer, (2009) 503. Zhang, H., Li, M.: Security vulnerabilities of an remote password authentication scheme with smart card. In: 2011 International Conference on Consumer Electronics, Communications and Networks, CECNet 2011 - Proceedings, pp. 698-701. (2011) 504. Zhang, L., Razdan, A., Farin, G., Femiani, J., Bae, M., Lockwood, C.: 3D face authentication and recognition based on bilateral symmetry analysis. The Visual Computer 22, 43-55 (2006) 505. Zhang, L., Tang, S., Zhu, S.: A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Peer-to-Peer Networking and Applications 9, 108-126 (2016) 506. Zhang, L., Tang, S., Zhu, S.: Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks 1-16 (2016) 507. Zhang, Y., Sun, D., Qiu, Z.: A novel method for fusion operators evaluating at score-level fusion in biometric authentication. In: International Conference on Signal Processing Proceedings, ICSP, pp. 1339-1342. (2010) 508. Zhao, G., Li, Y., Du, L., Zhao, X.: Asynchronous Challenge-Response Authentication Solution Based on Smart Card in Cloud Environment. In: 2nd International Conference on Information Science and Control Engineering (ICISCE), 2015, pp. 156-159. (2015) 509. Zhao, H., Li, X.: S3PAS:A Scalable shoulder-surfing resistant textual-graphical password authentication scheme. In: Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, pp. 467-472. (2007) 510. Zhao, Z., Ahn, G.J., Hu, H.: Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation. ACM Transactions on Information and System Security 17, (2015) 511. Zheng, P., Sang, N.: Using phase and directional line features for efficient palmprint authentication. In: Proceedings of the 2009 2nd International Congress on Image and Signal Processing, CISP'09. (2009) 512. Zheng, P.: Gaussian Shape Descriptor for Palmprint Authentication. Cognitive Computation 2, 303-311 (2010) 513. Zheng, Z., Liu, X., Yin, L., Liu, Z.: A stroke-based textual password authentication scheme. In: Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS 2009, pp. 90-95. (2009) 514. Zhou, Y., Cao, Z., Lu, R.: An efficient digital signature using self-certified public keys. Proceedings of the 3rd international conference on Information security. ACM, Shanghai, China (2004) 515. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50, 231-235 (2004)

Acceptance Topic 2 (AT2): Multi-Factor Authentication Methods

1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: A Novel Strong Password Generator for Improving Cloud Authentication. Procedia Computer Science 85, 293-300 (2016) 2. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: An efficient framework for enhancing user authentication in cloud storage using digital watermark. International Review on Computers and Software 10, 130-136 (2015) 3. Abdurrahman, U.A., Kaiiali, M., Muhammad, J.: A new mobile-based multi-factor authentication scheme using pre- shared number, GPS location and time stamp. In: 2013 International Conference on Electronics, Computer and Computation, ICECCO 2013, pp. 293-296. (2013) 4. Acharya, S., Polawar, A., Pawar, P.: Two factor authentication using smartphone generated one time password. IOSR Journal of Computer Engineering (IOSR-JCE) 11, 85-90 (2013) 5. Adida, B.: Beamauth: Two-factor web authentication with a bookmark. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 48-57. (2007) 6. Ahmed, M.N., Hussain, M.: Privacy Preserving Web Based Transaction Using E-Smart Cards and Image Authentication. In: Proceedings - 2015 2nd IEEE International Conference on Advances in Computing and Communication Engineering, ICACCE 2015, pp. 465-470. (2015) 7. Akram, S., Misbahuddin, M., Varaprasad, G.: A usable and secure two-factor authentication scheme. Information Security Journal 21, 169-182 (2012) 8. Al-Assam, H., Jassim, S.: Robust Biometric Based Key Agreement and Remote Mutual Authentication. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 59-65. (2012) 9. Al-Assam, H., Jassim, S.A.: Multi-factor challenge/response approach for remote biometric authentication. In: Proceedings of SPIE - The International Society for Optical Engineering. (2011) 10. Ali, A., Büchner, M., Segura, E.: Two factor authentication without the overhead of traditional OTP. In: Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009, pp. 141-147. (2009) 11. Almazyad, A.S., Ahmad, Y.: A new approach in T-FA authentication with OTP using mobile phone. Communications in Computer and Information Science, vol. 58, pp. 9-17 (2009) 12. Alnajjar, A., Janicke, H.: Multi-factor authentication using hardware information and user profiling techniques. In: Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, pp. 160-173. (2012) 13. Aloul, F., Zahidi, S., El-Hajj, W.: Multi factor authentication using mobile phones. International Journal of Mathematics and Computer Science 4, 65-80 (2009) 14. Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 641-644. (2009) 15. Alpar, O.: Intelligent biometric pattern password authentication systems for touchscreens. Expert Systems with Applications 42, 6286-6294 (2015) 16. Alqattan, A., Kaviani, N., Lewis, P., Pearson, N.: A two-factor authentication system using mobile devices to protect against untrusted public computers. University of British Columbia, Canada 329, (2007) 17. Amin, R., Biswas, G.P.: A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity. Journal of Medical Systems 39, (2015) 18. Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device. In: Proceedings of the 2015 3rd International Conference on Computer, Communication, Control and Information Technology, C3IT 2015. (2015) 19. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Obaidat, M.S.: Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. Journal of Medical Systems 39, 1-20 (2015) 20. Amin, R., Islam, S.H., Biswas, P.G., Khan, M.K., Li, X.: Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. Journal of Medical Systems 39, 1-21 (2015) 21. Amin, R., Islam, S.K.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three- factor authenticated key exchange protocol for wireless sensor networks. Computer Networks 101, 42-62 (2016) 22. Anzaku, E.T., Sohn, H., Ro, Y.M.: Multi-factor authentication using fingerprints and user-specific random projection. In: Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010, pp. 415-418. (2010) 23. Ariffin, N.A.M., Sani, N.F.M.: Plan recognition scheme using multi-factors authentication for smart card online system. In: Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, pp. 156-160. (2014) 24. Arshad, H., Nikooghadam, M.: Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. Journal of Supercomputing 71, 3163-3180 (2015) 25. Arshad, H., Nikooghadam, M.: Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38, (2014) 26. Arshad, H., Teymoori, V., Nikooghadam, M., Abbassi, H.: On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 39, 1-10 (2015) 27. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. Proceedings of the 8th International Conference on Security of Information and Networks. ACM, Sochi, Russia (2015) 28. Banerjee, S., Dutta, M.P., Bhunia, C.T.: Cryptanalysis and Security Enhancement of an Efficient and Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments. Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015). ACM, Unnao, India (2015) 29. Bashir, M., Kempf, J.: Person authentication with RDTW based on handwritten PIN and signature with a novel biometric smart pen device. In: Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009. CIB 2009. IEEE Workshop on, pp. 63-68. IEEE, (2009) 30. Battaglia, F., Iannizzotto, G., Lo Bello, L.: A biometric authentication system based on face recognition and rfid tags. Mondo Digitale 13, (2014) 31. Benhammadi, F., Beghdad Bey, K.: Password hardened fuzzy vault for fingerprint authentication system. Image and Vision Computing 32, 487-496 (2014) 32. Beton, M., Marie, V., Rosenberger, C.: Biometric secret path for mobile user authentication: A preliminary study. In: Computer and Information Technology (WCCIT), 2013 World Congress on, pp. 1-6. (2013) 33. Bhargav-Spantzel, A., Squicciarini, A., Bertino, E.: Privacy preserving multi-factor authentication with biometrics. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06, pp. 63-72. (2006) 34. Bhattasali, T., Saeed, K.: Two factor remote authentication in healthcare. In: Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pp. 380-386. (2014) 35. Bhutta, F.K., Ghafoor, A., Sultan, S.: Smart phone based authentication and authorization protocol for SPACS. In: 2012 9th International Conference on High Capacity Optical Networks and Enabling Technologies, HONET 2012, pp. 127-131. (2012) 36. Bindu, C.S., Reddy, P.C.S., Satyanarayana, B.: Improved remote user authentication scheme preserving user anonymity. International Journal of Computer Science and Network Security 8, 62-66 (2008) 37. Binu, S., Misbahuddin, M., Raj, P.: A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services. Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, Kochi, India (2015) 38. Binu, S., Mohan, A., Deepak, K.T., Manohar, S., Misbahuddin, M., Raj, P.: A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment. In: Souvenir of the 2015 IEEE International Advance Computing Conference, IACC 2015, pp. 1224-1229. (2015) 39. Boyd, D.J.: Single sign-on to the web with an EMV card. In: 2008 International Symposium on Collaborative Technologies and Systems, CTS'08, pp. 112-120. (2008) 40. Braeken, A.: Efficient anonym smart card based authentication scheme for multi-server architecture. International Journal of Smart Home 9, 177-184 (2015) 41. Brasee, K., Kami Makki, S., Zeadally, S.: A secure two-factor authentication scheme for single sign-on services. Security and Communication Networks 2, 315-323 (2009) 42. Brasee, K., Makki, S.K., Zeadally, S.: A Novel Distributed Authentication Framework for Single Sign-On Services. In: International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE, pp. 52-58. (2008) 43. Briggs, P., Olivier, P.L.: Biometric daemons: authentication via electronic pets. CHI '08 Extended Abstracts on Human Factors in Computing Systems. ACM, Florence, Italy (2008) 44. Bringer, J., Chabanne, H., Pointcheval, D., Zimmer, S.: An application of the Boneh and Shacham group signature scheme to biometric authentication. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5312 LNCS, pp. 219-230 (2008) 45. Brömme, A., Al-Zubi, S.: Multifactor Biometric Sketch Authentication. In: BIOSIG, pp. 81-90. (2003) 46. Cao, L., Ge, W.: Analysis and improvement of a multi-factor biometric authentication scheme. Security and Communication Networks 8, 617-625 (2015) 47. Cao, T., Huang, S.: Two-factor authentication schemes based smart card and password with user anonymity. Journal of Computational Information Systems 9, 8831-8838 (2013) 48. Cao, T., Zhai, J.: Improved dynamic ID-based authentication scheme for telecare medical information systems. Journal of Medical Systems 37, (2013) 49. Carullo, G., Ferrucci, F., Sarro, F.: Towards improving usability of authentication systems using smartphones for logical and physical resource access in a single sign-on environment. Information Systems: Crossroads for Organization, Management, Accounting and Engineering: ItAIS: The Italian Association for Information Systems, pp. 145-153 (2013) 50. Chandrakar, P., Om, H.: RSA Based Two-factor Remote User Authentication Scheme with User Anonymity. In: Procedia Computer Science, pp. 318-324. (2015) 51. Chang, C.-C., Hwang, S.-J.: Using smart cards to authenticate remote passwords. Computers & Mathematics with Applications 26, 19-27 (1993) 52. Chang, C.-C., Lee, J.-S.: An efficient and secure multi-server password authentication scheme using smart cards. In: International Conference on Cyberworlds, 2004, pp. 417-422. IEEE, (2004) 53. Chang, C.-C., Liao, W.-Y.: A remote password authentication scheme based upon ElGamal's signature scheme. Computers & Security 13, 137-144 (1994) 54. Chang, C.-C., Nguyen, N.-T.: An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation. Wireless Personal Communications 1-21 (2016) 55. Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEE Proceedings E-Computers and Digital Techniques 138, 165-168 (1991) 56. Chang, Y.F., Tai, W.L., Chang, H.C.: Untraceable dynamic‐identity‐based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 27, 3430-3440 (2014) 57. Chang, Y.F., Tai, W.L., Lin, S.C., Kwamg, T.S.: A two-factor and reader-undedicated authentication scheme with passive RFID tags in WLAN. In: Proceedings - 2013 International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2013, pp. 279-284. (2013) 58. Chang, Y.-F., Yu, S.-H., Shiao, D.-R.: A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems 37, 1-9 (2013) 59. Chao, J.: An improved remote password authentication scheme with smart card. Journal of Electronics (China) 29, 550-555 (2012) 60. Chaturvedi, A., Mishra, D., Mukhopadhyay, S.: Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8303 LNCS, pp. 63-77 (2013) 61. Chaudhari, S., Tomar, S., Rawat, A.: Design, implementation and analysis of multi layer, Multi Factor Authentication (MFA) setup for webmail access in multi trust networks. In: International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 2011, pp. 27-32. IEEE, (2011) 62. Chaudhry, S.A., Farash, M.S., Naqvi, H., Kumari, S., Khan, M.K.: An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks 8, 3782-3795 (2015) 63. Chaudhry, S.A., Naqvi, H., Farash, M.S., Shon, T., Sher, M.: An improved and robust biometrics-based three factor authentication scheme for multiserver environments. Journal of Supercomputing 1-17 (2015) 64. Chaudhry, S.A., Naqvi, H., Shon, T., Sher, M., Farash, M.S.: Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-11 (2015) 65. Chaurasia, B.K., Shahi, A., Verma, S.: Authentication in cloud computing environment using two factor authentication. Advances in Intelligent Systems and Computing, vol. 259, pp. 779-785 (2014) 66. Cheikrouhou, O., Boujelben, M., Koubaa, A., Abid, M.: Attacks and improvement of "security enhancement for a dynamic ID-based remote user authentication scheme". In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 517-522. (2009) 67. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart‐card‐based remote user password authentication scheme. International Journal of Communication Systems 27, 377-389 (2014) 68. Chen, C.L., Lee, C.C., Hsu, C.Y.: Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 25, 585-597 (2012) 69. Chen, C.T., Lee, C.C.: A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks 8, 1608-1625 (2015) 70. Chen, H.-M., Lo, J.-W., Yeh, C.-K.: An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 36, 3907-3915 (2012) 71. Chen, L., Wei, F., Ma, C.: A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques. International Journal of Distributed Sensor Networks 2015, (2015) 72. Chen, T.-H., Hsiang, H.-C., Shih, W.-K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems 27, 377-380 (2011) 73. Chen, Y., Sun, J., Zhang, R., Zhang, Y.: Your song your way: Rhythm-based two-factor authentication for multi- touch mobile devices. In: Proceedings - IEEE INFOCOM, pp. 2686-2694. (2015) 74. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A modified remote login authentication scheme based on geometric approach. Journal of Systems and Software 55, 287-290 (2001) 75. Chong, L.G., Kiong, L.C., Letchumanan, C.: Two-factor face authentication: Topographic Independent Component Analysis (TICA) and Multispace Random Projection (MRP). In: SoCPaR 2009 - Soft Computing and Pattern Recognition, pp. 756-761. (2009) 76. Chuang, M.-C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications 41, 1411-1418 (2014) 77. Chudá, D., Ďurfina, M.: Multifactor authentication based on keystroke dynamics. In: ACM International Conference Proceeding Series, pp. V.21-V.26. (2009) 78. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications. ACM, Berkley, California (2003) 79. Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: A novel approach for dual-factor authentication. Pattern Analysis and Applications 7, 255-268 (2004) 80. Czajka, A., Strzelczyk, P., Chochowski, M., Pacut, A.: Iris recognition with match-on-card. In: Signal Processing Conference, 2007 15th European, pp. 189-192. (2007) 81. Czeskis, A., Dietz, M., Kohno, T., Wallach, D., Balfanz, D.: Strengthening user authentication through opportunistic cryptographic identity assertions. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 404-414. (2012) 82. Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards. Journal of King Saud University - Computer and Information Sciences 27, 193-210 (2015) 83. Das, A.K., Goswami, A.: A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems 37, 1-16 (2013) 84. Das, A.K., Goswami, A.: An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function. Journal of Medical Systems 38, 1-19 (2014) 85. Das, A.K.: A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks. Wireless Personal Communications 82, 1377-1404 (2015) 86. Das, A.K.: A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. Journal of Medical Systems 39, 1-14 (2015) 87. Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 9, 223-244 (2016) 88. Das, A.K.: A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems. Journal of Medical Systems 39, (2015) 89. Das, A.K.: An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. International Journal of Communication Networks and Distributed Systems 15, 22-60 (2015) 90. Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 5, 145-151 (2011) 91. Das, M.L., Narasimhan, V.L.: EARS: Efficient Entity Authentication in Remote Systems. In: Proceedings - International Conference on Information Technology: New Generations, ITNG 2008, pp. 603-608. (2008) 92. Das, M.L., Narasimhan, V.L.: Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. In: Fifth International Conference on Information Technology: New Generations, 2008. ITNG 2008., pp. 545- 550. (2008) 93. Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote user authentication scheme using bilinear pairings. Computers & Security 25, 184-189 (2006) 94. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE transactions on Consumer Electronics 50, 629-631 (2004) 95. Das, M.L.: Secure and Efficient Authentication Scheme for Remote Systems. In: International Conference on Information Technology, 2008. ICIT '08., pp. 226-231. (2008) 96. de Souza, R.L., Lung, L.C., Custódio, R.F.: Multi-factor Authentication in Key Management Systems. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 746-752. IEEE, (2013) 97. Derawi, M.O., McCallum, S., Witte, H., Bours, P.: Biometric access control using Near Field Communication and smart phones. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 490-497. (2012) 98. Dharavath, K., Talukdar, F.A., Laskar, R.H.: Facial image processing in conjunction with password for intelligent access control. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. (2016) 99. Di Pietro, R., Me, G., Strangio, M.A.: A two-factor mobile authentication scheme for secure financial transactions. In: 4th Annual International Conference on Mobile Business, ICMB 2005, pp. 28-34. (2005) 100. Diaconu, A.V.: Passcode based authentication protocol: Part I — Solution evaluation and software design. In: Electrical and Electronics Engineering (ISEEE), 2010 3rd International Symposium on, pp. 204-210. (2010) 101. Diaz-Tellez, Y.H., Bodanese, E.L., Dimitrakos, T., Turner, M.: Context-Aware Multifactor Authentication Based on Dynamic Pin. In: IFIP International Information Security Conference, pp. 330-338. Springer, (2014) 102. Eldefrawy, M.H., Alghathbar, K., Khan, M.K.: OTP-based two-factor authentication using mobile phones. In: Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pp. 327-331. (2011) 103. Eldefrawy, M.H., Khan, M.K., Alghathbar, K., Kim, T.H., Elkamchouchi, H.: Mobile one-time passwords: Two- factor authentication using mobile phones. Security and Communication Networks 5, 508-516 (2012) 104. Eldefrawy, M.H., Khan, M.K., Elkamchouchi, H.: The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices. In: 11th International Conference on Information Technology: New Generations (ITNG), 2014, pp. 196-200. (2014) 105. Eminaʇaoʇlu, M., Çini, E., Sert, G., Zor, D.: A two-factor authentication system with QR codes for web and mobile applications. In: Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014, pp. 105-112. (2014) 106. Esiner, E., Datta, A.: Layered security for storage at the edge: on decentralized multi-factor access control. Proceedings of the 17th International Conference on Distributed Computing and Networking. ACM, Singapore, Singapore (2016) 107. Fan, C.-I., Lin, Y.-H., Hsu, R.-H.: NIS03-6: Remote Password Authentication Scheme with Smart Cards and Biometrics. In: IEEE Globecom 2006, pp. 1-5. IEEE, (2006) 108. Fan, C.I., Lin, Y.H.: Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Transactions on Information Forensics and Security 4, 933-945 (2009) 109. Fan, L., Li, J.-H., Zhu, H.-W.: An enhancement of timestamp-based password authentication scheme. Computers & Security 21, 665-667 (2002) 110. Fathi, R., Salehi, M.A., Leiss, E.L.: User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services. In: 2015 IEEE 8th International Conference on Cloud Computing, pp. 516-523. (2015) 111. Fleischhacker, N., Manulis, M., Azodi, A.: A modular framework for multi-factor authentication and key exchange. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8893, pp. 190-214 (2014) 112. Fujii, H., Shigematsu, N., Kurokawa, H., Nakagawa, T.: Telelogin: A two-factor two-path authentication technique using caller ID. NTT Technical Review 6, (2008) 113. Fujii, H., Tsuruoka, Y.: SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. In: 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 283-287. (2013) 114. Fujii, H., Tsuruoka, Y.: Three-factor user authentication method using biometrics challenge response. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7859 LNCS, pp. 395-396 (2013) 115. Go, W., Lee, K., Kwak, J.: Construction of a secure two-factor user authentication system using fingerprint information and password. Journal of Intelligent Manufacturing 25, 217-230 (2014) 116. Goriparthi, T., Lal Das, M., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Computer Standards & Interfaces 31, 181-185 (2009) 117. Griffin, P.H.: Biometric Knowledge Extraction for Multi-factor Authentication and Key Exchange. In: Procedia Computer Science, pp. 66-71. (2015) 118. Griffin, P.H.: Telebiometric authentication objects. In: Procedia Computer Science, pp. 393-400. (2014) 119. Guo, M.H., Liaw, H.T., Deng, D.J., Chao, H.C.: An RFID secure authentication mechanism in WLAN. Computer Communications 34, 236-240 (2011) 120. Gyorffy, J.C., Tappenden, A.F., Miller, J.: Token-based graphical password authentication. International Journal of Information Security 10, 321-336 (2011) 121. Haar, D.v.d.: CaNViS: A cardiac and neurological-based verification system that uses wearable sensors. In: Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 2015, pp. 99-104. (2015) 122. Hafizul Islam, S.K., Biswas, G.P.: Dynamic ID-based remote user mutual authentication scheme with smartcard using Elliptic Curve Cryptography. Journal of Electronics (China) 31, 473-488 (2014) 123. Hahn, C., Kwon, H., Kim, D., Hur, J.: Enhanced authentication for outsourced educational contents through provable block possession. Multimedia Tools and Applications (2015) 124. Hao, Z., Yu, N.: A security enhanced remote password authentication scheme using smart card. In: Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on, pp. 56-60. IEEE, (2010) 125. Harini, N., Padmanabhan, T.: 2CAuth: A new two factor authentication scheme using QR-code. International Journal of Engineering and Technology 5, 1087-1094 (2013) 126. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010) 127. Hayashi, E., Das, S., Amini, S., Hong, J., Oakley, I.: CASA: context-aware scalable authentication. Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United Kingdom (2013) 128. He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user Authentication Scheme in Wireless Sensor Networks. Ad-Hoc and Sensor Wireless Networks 10, 361-371 (2010) 129. He, D., Kumar, N., Khan, M.K., Lee, J.h.: Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics 59, 811-817 (2013) 130. He, D., Kumar, N., Lee, J.H., Sherratt, R.S.: Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics 60, 30-37 (2014) 131. He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Computer Communications 34, 367-374 (2011) 132. He, W., Peng, X., Meng, X., Liu, X.: Two-factor authentication system based on optical interference and one-way Hash function. In: Proceedings of SPIE - The International Society for Optical Engineering. (2012) 133. Holz, C., Bentley, F.R.: On-Demand Biometrics: Fast Cross-Device Authentication. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016) 134. Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces 31, 1118-1123 (2009) 135. Hsiang, H.-C., Shih, W.-K.: Weaknesses and improvements of the Yoon–Ryu–Yoo remote user authentication scheme using smart cards. Computer Communications 32, 649-652 (2009) 136. Hsiao, T.-C., Liao, Y.-T., Huang, J.-Y., Chen, T.-S., Horng, G.-B.: An Authentication Scheme to Healthcare Security under Wireless Sensor Networks. Journal of Medical Systems 36, 3649-3664 (2012) 137. Hsieh, W.B., Leu, J.S.: A robust user authentication scheme using dynamic identity in wireless sensor networks. Wireless Personal Communications 77, 979-989 (2014) 138. Hsieh, W.-B., Leu, J.-S.: An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. The Journal of Supercomputing 70, 133-148 (2014) 139. Hsieh, W.-B., Leu, J.-S.: Exploiting hash functions to intensify the remote user authentication scheme. Computers & Security 31, 791-798 (2012) 140. Hu, J.Y., Sueng, C.C., Liao, W.H., Ho, C.C.: Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking. In: Computing, Communications and Applications Conference (ComComAp), 2012, pp. 111-116. (2012) 141. Huang, B., Khan, M.K., Wu, L., Muhaya, F.T.B., He, D.: An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography. Wireless Personal Communications 85, 225-240 (2015) 142. Huang, H.F., Chang, Y.F., Liu, C.H.: Enhancement of two-factor user authentication in wireless sensor networks. In: Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, pp. 27-30. (2010) 143. Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 22, 1390-1397 (2011) 144. Huseynov, E., Seigneur, J.M.: WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts. In: Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, K-2015 - Academic Conference. (2015) 145. Hwang, M.-S., Chong, S.-K., Chen, T.-Y.: DoS-resistant ID-based password authentication scheme using smart cards. Journal of Systems and Software 83, 163-172 (2010) 146. Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: A simple remote user authentication scheme. Mathematical and Computer Modelling 36, 103-107 (2002) 147. Hwang, M.-S., Li, L.-H., Lee, C.-C.: A key authentication scheme with non-repudiation. SIGOPS Oper. Syst. Rev. 38, 75-78 (2004) 148. Indu, S., Sathya, T.N., Saravana Kumar, V.: A stand-alone and SMS-based approach for authentication using mobile phone. In: 2013 International Conference on Information Communication and Embedded Systems, ICICES 2013, pp. 140-145. (2013) 149. Islam, S.: Design and analysis of an improved smartcard‐based remote user password authentication scheme. International Journal of Communication Systems (2014) 150. Islam, S.H., Khan, M.K.: Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-16 (2014) 151. Islam, S.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dynamics 78, 2261-2276 (2014) 152. Islam, S.K.H., Biswas, G.P.: Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system. Journal of King Saud University - Computer and Information Sciences 27, 211- 221 (2015) 153. Jayasudha, A.C.: Two factor authenticated cash withdrawal using mobile phones and apprehend insecure users within the ATM centre. Contemporary Engineering Sciences 7, 449-455 (2014) 154. Jeong, Y.S., Park, J.S., Park, J.H.: An efficient authentication system of smart device using multi factors in mobile cloud service architecture. International Journal of Communication Systems 28, 659-674 (2015) 155. Jiang, L., Li, X., Guo, D.: Mutual password authentication with key agreement and user anonymity for cloud storage. Journal of Computers (Taiwan) 27, 12-25 (2016) 156. Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-Health clouds. Journal of Supercomputing 1-24 (2016) 157. Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart‐card‐based password authentication scheme. International Journal of Communication Systems 28, 383-393 (2015) 158. Jiang, Q., Ma, J., Li, G., Yang, L.: Robust two-factor authentication and key agreement preserving user privacy. International Journal of Network Security 16, 229-240 (2014) 159. Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8, 1070-1081 (2014) 160. Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems 38, (2014) 161. Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics 83, 2085-2101 (2016) 162. Jiang, R., Pan, L., Li, J.-H.: Further analysis of password authentication schemes based on authentication tests. Computers & Security 23, 469-477 (2004) 163. Jiang, W.q., Huang, Z.q., Yang, Y.x., Tian, J., Li, L.: ID-based authentication scheme combined with identity-based encryption with fingerprint hashing. Journal of China Universities of Posts and Telecommunications 15, 75-"80,120" (2008) 164. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245-2255 (2004) 165. Johnson, B., Maillart, T., Chuang, J.: My thoughts are not your thoughts. In: UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 1329-1338. (2014) 166. Juang, W.-S., Wu, J.-L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs. Computers & Electrical Engineering 35, 33-40 (2009) 167. Juang, W.-S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics 50, 251-255 (2004) 168. Jun, E.-A., Ji, J.D., Lim, J., Jung, S.W.: Improved remote user authentication scheme using bilinear pairings. Proceedings of the 2009 International Conference on Hybrid Information Technology. ACM, Daejeon, Korea (2009) 169. Jung, J., Lee, D., Kim, J., Lee, Y., Kang, D., Won, D.: Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM, Danang, Viet Nam (2016) 170. Kalra, S., Sood, S.: Advanced remote user authentication protocol for multi-server architecture based on ECC. Journal of Information Security and Applications 18, 98-107 (2013) 171. Kalra, S., Sood, S.K.: Advanced password based authentication scheme for wireless sensor networks. Journal of Information Security and Applications 20, 37-46 (2015) 172. Kalsoom, S., Ziauddin, S.: Cryptanalysis and improvement of a two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels. International Journal of Machine Learning and Computing 3, 400 (2013) 173. Kanade, S., Camara, D., Krichen, E., Petrovska-Delacrétaz, D., Dorizzi, B.: Three factor scheme for biometric-based cryptographic key regeneration using iris. In: Biometrics Symposium, 2008. BSYM'08, pp. 59-64. IEEE, (2008) 174. Kang, J., Nyang, D., Lee, K.: Two factor face authentication scheme with cancelable feature. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3781 LNCS, pp. 67-76 (2005) 175. Kang, J., Nyang, D., Lee, K.: Two-factor face authentication using matrix permutation transformation and a user password. Information Sciences 269, 1-20 (2014) 176. Karapanos, N., Marforio, C., Soriente, C., Capkun, S.: Sound-proof: Usable two-factor authentication based on ambient sound. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 483-498. (2015) 177. Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. Journal of Information Security and Applications 19, 282-294 (2014) 178. Kathrine, G.J.W., Kirubakaran, E.: Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security. Int J Comput Appl 30, 13-20 (2011) 179. Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10, 2450-2459 (2010) 180. Khan, M.K., Kim, S.-K., Alghathbar, K.: Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Computer Communications 34, 305-309 (2011) 181. Khan, M.K., Kumari, S., Gupta, M.K.: More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96, 793-816 (2014) 182. Khan, M.K., Kumari, S.: An Authentication Scheme for Secure Access to Healthcare Services. Journal of Medical Systems 37, 1-12 (2013) 183. Khan, M.K., Kumari, S.: Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID‐based Authentication Scheme for Telecare Medical Information Systems”. Security and Communication Networks 7, 399- 408 (2014) 184. Khan, M.K., Zhang, J., Wang, X.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35, 519-524 (2008) 185. Khan, M.K., Zhang, J.: Improving the security of ‘a flexible biometrics remote user authentication scheme’. Computer Standards & Interfaces 29, 82-85 (2007) 186. Khan, M.K.: Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Technical Review 26, 191-195 (2009) 187. Khan, S.H., Akbar, M.A.: Multi-Factor Authentication on Cloud. In: 2015 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2015. (2015) 188. Khan, S.H., Ali Akbar, M., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor authentication. Pattern Recognition 48, 458-472 (2015) 189. Kim, A., Gyeonghyeon, P., Youjung, S., Lee, S.H.: A non-memorization bio-password scheme with confidence interval sets. In: 2013 International Conference on ICT Convergence (ICTC), pp. 1102-1106. (2013) 190. Kim, A.Y., Lee, S.H.: Authentication Protocol using Fuzzy Eigenface Vault based on MoC. In: The 9th International Conference on Advanced Communication Technology, pp. 1771-1775. (2007) 191. Kim, H.-S., Lee, S.-W., Yoo, K.-Y.: ID-based password authentication scheme using smart cards and fingerprints. SIGOPS Oper. Syst. Rev. 37, 32-41 (2003) 192. Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14, 6443-6462 (2014) 193. Kim, K.-W., Jeon, J.-C., Yoo, K.-Y.: Efficient and secure password authentication schemes for low-power devices. International Journal of Sensor Networks 2, 77-81 (2007) 194. Kim, S.H., Choi, D., Jin, S.H., Lee, S.H.: Geo-location based QR-code authentication scheme to defeat active real- time phishing attack. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 51- 61. (2013) 195. Kolhe, V., Gunjal, V., Kalasakar, S., Rathod, P.: Secure Authentication with 3D Password. International Journal Of Engineering Science And Innovative Technology (IJESIT) (2013) 196. Ku, Y., Choi, O., Kim, K., Shon, T., Hong, M., Yeh, H., Kim, J.H.: Two-factor authentication system based on extended OTP mechanism. International Journal of Computer Mathematics 90, 2515-2529 (2013) 197. Kumar, A.S., Girish, K.P.: A three factor authentication system for smartcard using biometric, Visual cryptography and otp. Advances in Intelligent Systems and Computing, vol. 324, pp. 673-679 (2015) 198. Kumar, M., Gupta, M.K., Kumari, S.: An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks. IJ Network Security 13, 167-177 (2011) 199. Kumar, P., Choudhury, A.J., Sain, M., Lee, S.-G., Lee, H.-J.: RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11, 5020-5046 (2011) 200. Kumar, P., Lee, S.G., Lee, H.J.: A user authentication for healthcare application using wireless medical sensor networks. In: Proc.- 2011 IEEE International Conference on HPCC 2011 - 2011 IEEE International Workshop on FTDCS 2011 -Workshops of the 2011 Int. Conf. on UIC 2011- Workshops of the 2011 Int. Conf. ATC 2011, pp. 647-652. (2011) 201. Kumar, P., Sain, M., Lee, H.J.: An efficient two-factor user authentication framework for wireless sensor networks. In: 13th International Conference on Advanced Communication Technology (ICACT), 2011, pp. 574-578. (2011) 202. Kumari, S., Khan, M.K., Li, X.: A more secure digital rights management authentication scheme based on smart card. Multimedia Tools and Applications 75, 1135-1158 (2016) 203. Kumari, S., Khan, M.K., Li, X.: An improved remote user authentication scheme with key agreement. Computers & Electrical Engineering 40, 1997-2012 (2014) 204. Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems 27, 3939-3955 (2014) 205. Kumari, S., Khan, M.K.: More secure smart card‐based remote user password authentication scheme with user anonymity. Security and Communication Networks 7, 2039-2053 (2014) 206. Kumari, S., Li, X., Wu, F., Das, A.K., Arshad, H., Khan, M.K.: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems (2016) 207. Kumari, S., Wu, F., Li, X., Farash, M.S., Jiang, Q., Khan, M.K., Das, A.K.: Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multimedia Tools and Applications 1-31 (2015) 208. Lai, W.K., Tan, B.G., Soo, M.S., Khan, I.: Two-factor user authentication with the CogRAM weightless neural net. In: 2014 International Joint Conference on Neural Networks (IJCNN), pp. 3751-3758. (2014) 209. Laptikultham, S., Tritilanunt, S.: Modeling and analysis of two-factor authentication protocol for USB digital evidence acquisition devices. In: Proceedings of the 2015 12th International Joint Conference on Computer Science and Software Engineering, JCSSE 2015, pp. 241-246. (2015) 210. Le, H.D., Chang, C.C., Chou, Y.C.: A novel untraceable authentication scheme for mobile roaming in GLOMONET. International Journal of Network Security 17, 395-404 (2015) 211. Lee, C.C., Chen, C.T., Wu, P.H., Chen, T.Y.: Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Computers and Digital Techniques 7, 48-55 (2013) 212. Lee, C.-C., Hsu, C.-W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dynamics 71, 201-211 (2013) 213. Lee, K.: A study on user access control method using multi-factor authentication for EDMS. International Journal of Security and its Applications 7, 327-334 (2013) 214. Lee, S., Ong, I., Lim, H.-T., Lee, H.-J.: Two factor authentication for cloud computing. Journal of information and communication convergence engineering 8, 427-432 (2010) 215. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation 167, 355-361 (2005) 216. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 27, 181-183 (2005) 217. Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C.: A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. Journal of Medical Systems 37, 1-7 (2013) 218. Lee, T.-F., Liu, C.-M.: A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-8 (2013) 219. Lee, Y., Yang, H., Won, D.: Attacking and improving on Lee and Chiu's authentication scheme using smart cards. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6047 LNCS, pp. 377-385 (2010) 220. Lee, Y.-C., Hsieh, Y.-C., Lee, P.-J., You, P.-S.: Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards. Journal of Applied Research and Technology 12, 1063-1072 (2014) 221. Lee, Y.C.: Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme. Journal of Applied Research and Technology 11, 597-603 (2013) 222. Li, C., Qi, J.: A two-factor authentication design of fingerprint recognition system based on DSP and RF card. In: 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010, pp. 441-445. (2010) 223. Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 33, 1-5 (2010) 224. Li, C.-T., Lee, C.-C., Lee, C.-W.: An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography. Sensor Letters 11, 958-965 (2013) 225. Li, C.T., Lee, C.C., Wang, L.J., Liu, C.J.: A secure billing service with two-factor user authentication in wireless sensor networks. International Journal of Innovative Computing, Information and Control 7, 4821-4831 (2011) 226. Li, C.-T., Lee, C.-C., Weng, C.-Y., Fan, C.-I.: An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Transactions on Internet & Information Systems 7, (2013) 227. Li, C.-T., Lee, C.-C., Weng, C.-Y.: A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-11 (2014) 228. Li, C.-T., Lee, C.-C., Weng, C.-Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics 74, 1133- 1143 (2013) 229. Li, C.T., Weng, C.Y., Fan, C.I.: Two-factor user authentication in multi-server networks. International Journal of Security and its Applications 6, 261-268 (2012) 230. Li, C.T., Weng, C.Y., Lee, C.C., Chin-Wen, L.: Towards secure and dynamic password based user authentication scheme in hierarchical wireless sensor networks. International Journal of Security and its Applications 7, 249-258 (2013) 231. Li, C.-T., Weng, C.-Y., Lee, C.-C., Wang, C.-C.: A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System. Journal of Medical Systems 39, 1-11 (2015) 232. Li, C.-T., Weng, C.-Y., Lee, C.-C., Wang, C.-C.: Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS. Procedia Computer Science 52, 21-28 (2015) 233. Li, C.-T., Weng, C.-Y., Lee, C.-C.: An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13, 9589-9603 (2013) 234. Li, C.T.: A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Information Security 7, 3-10 (2013) 235. Li, C.T.: Secure smart card based password authentication scheme with user anonymity. Information Technology and Control 40, 157-162 (2011) 236. Li, F., Liu, Q., Pang, L., Pei, Q.: Identity Authentication Based on Fuzzy Vault and Digital Certificate. In: International Conference on Computational Intelligence and Security (CIS), 2010, pp. 441-445. (2010) 237. Li, H., Hu, L., Yuan, W., Chu, J.: Attacking and improving of Das's authentication scheme in wireless sensor networks. Journal of Convergence Information Technology 7, 396-403 (2012) 238. Li, T., Jin, Z.: A New Low Cost One Time ID and Password Authentication Protocol Using Popular Removable Storage Devices. In: Second International Conference on Intelligent Networks and Intelligent Systems, 2009. ICINIS '09., pp. 213-216. (2009) 239. Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58, 85-95 (2013) 240. Li, X., Niu, J., Khan, M.K., Liao, J., Zhao, X.: Robust three‐factor remote user authentication scheme with key agreement for multimedia systems. Security and Communication Networks (2014) 241. Li, X., Niu, J., Khan, M.K., Liao, J.: Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement. In: Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, pp. 105-110. (2013) 242. Li, X., Niu, J., Khurram Khan, M., Liao, J.: An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 36, 1365-1371 (2013) 243. Li, X., Niu, J., Kumari, S., Islam, S.H., Wu, F., Khan, M.K., Das, A.K.: A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wireless Personal Communications 89, 569-597 (2016) 244. Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks 7, 1488-1497 (2014) 245. Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three‐factor remote user authentication scheme with key agreement. Security and Communication Networks 7, 1488-1497 (2014) 246. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: A biometric-based password authentication with key exchange scheme using mobile device for multi-server environment. Applied Mathematics and Information Sciences 9, 1123-1137 (2015) 247. Li, X., Wen, Q., Li, W.: A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications. Wireless Personal Communications 86, 1593-1610 (2016) 248. Li, X., Zhang, Y.: A simple and robust anonymous two‐factor authenticated key exchange protocol. Security and Communication Networks 6, 711-722 (2013) 249. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: Security enhancement for a dynamic ID-based remote user authentication scheme. In: International Conference on Next Generation Web Services Practices (NWeSP'05), pp. 4 pp. IEEE, (2009) 250. Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling 44, 223-228 (2006) 251. Lin, C.-H., Lai, Y.-Y.: A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces 27, 19-23 (2004) 252. Lin, H.-Y.: On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 37, 1-5 (2013) 253. Lin, X., Huafei, Z., Ho, P.H., Shen, X.: Two-Factor Localized Authentication Scheme for WLAN Roaming. In: 2007 IEEE International Conference on Communications, pp. 1172-1178. (2007) 254. Lin, Y., Wang, K., Zhang, B., Liu, Y., Li, X.: An enhanced biometric-based three factors user authentication scheme for multi-server environments. International Journal of Security and its Applications 10, 315-328 (2016) 255. Liou, J.C., Bhashyam, S.: A feasible and cost effective two-factor authentication for online transactions. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010, pp. 47-51. (2010) 256. Liou, J.-C., Bhashyam, S.: On Improving Feasibility and Security Measures of Online Authentication. Int. J. Adv. Comp. Techn. 2, 6-16 (2010) 257. Liou, J.C., Egan, G., Patel, J.K., Bhashyam, S.: A sophisticated RFID application on multi-factor authentication. In: Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, pp. 180-185. (2011) 258. Liu, C.-H., Chung, Y.-F.: Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering (2016) 259. Liu, C.-L., Tsai, C.-J., Chang, T.-Y., Tsai, W.-J., Zhong, P.-K.: Implementing multiple biometric features for a recall- based graphical keystroke dynamics authentication system on a smart phone. Journal of Network and Computer Applications 53, 128-139 (2015) 260. Liu, F.: Efficient two-factor authentication protocol using password and smart card. Journal of Computers (Finland) 8, 3257-3263 (2013) 261. Liu, H., Zhang, Y.: An improved one-time password authentication scheme. In: International Conference on Communication Technology Proceedings, ICCT, pp. 1-5. (2013) 262. Liu, J.K., Au, M.H., Huang, X., Lu, R., Li, J.: Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Transactions on Information Forensics and Security 11, 484-497 (2016) 263. Liu, W., Uluagac, A.S., Beyah, R.: MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data. In: Proceedings - IEEE INFOCOM, pp. 518-523. (2014) 264. Liu, W., Xie, Q., Wang, S., Hu, B.: An improved authenticated key agreement protocol for telecare medicine information system. SpringerPlus 5, 1-16 (2016) 265. Liu, X., Cheung, Y.M.: Learning multi-boosted HMMs for lip-password based speaker verification. IEEE Transactions on Information Forensics and Security 9, 233-246 (2014) 266. Liu, Y., Wei, F., Ma, C.: Multi-factor authenticated key exchange protocol in the three-party setting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6584 LNCS, pp. 255-267 (2011) 267. Lu, Y., Li, L., Peng, H., Xie, D., Yang, Y.: Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. Journal of Medical Systems 39, 1-10 (2015) 268. Lu, Y., Li, L., Peng, H., Yang, Y.: An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem. Journal of Medical Systems 39, 1-8 (2015) 269. Lu, Y.F., Lin, P.H., Ye, S.S., Wang, R.S., Chou, S.C.: A strong authentication with key agreement scheme for web- based collaborative systems. In: ISPACS 2012 - IEEE International Symposium on Intelligent Signal Processing and Communications Systems, pp. 343-348. (2012) 270. Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it's you!: implicit authentication based on touch screen patterns. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012) 271. Mali, P., Salunke, S., Mane, R., Khatavkar, P.: Multilevel ATM Security Based On Two Factor Biometrics. In: International Journal of Engineering Research and Technology. ESRSA Publications, (2012) 272. Mann, C., Loebenberger, D.: Two-factor authentication for the Bitcoin protocol. International Journal of Information Security 1-14 (2016) 273. Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: International Conference on Financial Cryptography and Data Security, pp. 88-103. Springer, (2007) 274. Mathew, H.M., Raj, S.B.E., Gundapu, P.S.J., Angeline, S.J.F.: An improved three-factor authentication scheme using smart card with biometric privacy protection. In: ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology, pp. 220-223. (2011) 275. Maxion, R.A., Killourhy, K.S.: Keystroke biometrics with number-pad input. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 201-210. (2010) 276. Mir, O., van der Weide, T., Lee, C.-C.: A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-16 (2015) 277. Miranda, L.H.F.M.: Context-aware multi-factor authentication. Faculdade de Ciências e Tecnologia (2009) 278. Mirkovic, J., Bryhni, H., Ruland, C.M.: Secure solution for mobile access to patient's health care record. In: 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom), 2011, pp. 296-303. IEEE, (2011) 279. Misbahuddin, M., Premchand, P., Govardhan, A.: A user friendly password authenticated key agreement for multi server environment. Proceedings of the International Conference on Advances in Computing, Communication and Control. ACM, Mumbai, India (2009) 280. Mishra, D., Chaturvedi, A., Mukhopadhyay, S.: Design of a lightweight two-factor authentication scheme with smart card revocation. Journal of Information Security and Applications 23, 44-53 (2016) 281. Mishra, D., Das, A.K., Chaturvedi, A., Mukhopadhyay, S.: A secure password-based authentication and key agreement scheme using smart cards. Journal of Information Security and Applications 23, 28-43 (2015) 282. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications 41, 8129-8143 (2014) 283. Mishra, D., Srinivas, J., Mukhopadhyay, S.: A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-10 (2014) 284. Mohammed, M.M., Elsadig, M.: A multi-layer of multi factors authentication model for services. In: International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), 2013, pp. 220-224. (2013) 285. Moon, J., Yu, J., Yang, H., Won, D.: Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments. Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM, Danang, Viet Nam (2016) 286. Mtonga, K., Yoon, E.J., Kim, H.: A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 135 LNICST, pp. 79-89 (2014) 287. Mueller, R., Sanchez-Reillo, R.: An approach to biometric identity management using low-cost equipment. In: IIH- MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1096-1100. (2009) 288. Munch-Ellingsen, A., Karlsen, R., Andersen, A., Akselsen, S.: Two-factor authentication for android host card emulated contactless cards. In: 2015 1st Conference on Mobile and Secure Services, MOBISECSERV 2015. (2015) 289. Muniyandi, A.P., Ramasamy, R., Indrani: Password based remote authentication scheme using ECC for smart card. Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, Rourkela, Odisha, India (2011) 290. Nag, A.K., Dasgupta, D., Deb, K.: An adaptive approach for active multi-factor authentication. In: 9th Annual Symposium on Information Assurance (ASIA’14), pp. 39. (2014) 291. Nag, A.K., Dasgupta, D.: An adaptive approach for continuous multi-factor authentication in an identity eco-system. In: ACM International Conference Proceeding Series, pp. 65-68. (2014) 292. Nag, A.K., Roy, A., Dasgupta, D.: An Adaptive Approach Towards the Selection of Multi-Factor Authentication. In: Computational Intelligence, 2015 IEEE Symposium Series on, pp. 463-472. IEEE, (2015) 293. Nagaraju, S., Parthiban, L.: SecAuthn: Provably secure multi-factor authentication for the cloud computing systems. Indian Journal of Science and Technology 9, (2016) 294. Nam, J., Choo, K.-K.R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Plos one 10, e0116709 (2015) 295. Nanjing, C.: Advanced secure user authentication framework for cloud computing. (2013) 296. Narhar, U.K., Joshi, R.B.: Highly secure authentication scheme. In: Proceedings - 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA 2015, pp. 270-274. (2015) 297. Nematollahi, M.A., Gamboa-Rosales, H., Martinez-Ruiz, F.J., de la Rosa-Vargas, J.I., Al-Haddad, S.A.R., Esmaeilpour, M.: Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimedia Tools and Applications 1-31 (2016) 298. Nguyen, N.T., Le, H.D., Chang, C.C.: Provably secure and efficient three-factor authenticated key agreement scheme with untraceability. International Journal of Network Security 18, 335-344 (2016) 299. Ntantogian, C., Malliaros, S., Xenakis, C.: Gaithashing: A two-factor authentication scheme based on gait features. Computers and Security 52, 17-32 (2015) 300. Odelu, V., Das, A.K., Goswami, A.: An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. Journal of Information Security and Applications 21, 1-19 (2015) 301. Omar, M., Din, R., Tahir, H.: Smart cards and the fingerprint: A framework for user identification and authentication. Journal of ICT (2003) 302. Pang, Y.-H., J., A.T.B., L, D.N.C.: Two-Factor Cancelable Biometrics Authenticator. Journal of Computer Science and Technology 22, 54-59 (2007) 303. Panjwani, S., Cutrell, E.: Usably secure, low-cost authentication for . Proceedings of the Sixth Symposium on Usable Privacy and Security. ACM, Redmond, Washington, USA (2010) 304. Park, H., Redford, S.: Client certificate and IP address based multi-factor authentication for J2EE web applications. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, CASCON '07, pp. 167-174. (2007) 305. Park, H.J.: Enhanced user authentication scheme for wireless sensor networks. International Journal of Security and its Applications 9, 367-374 (2015) 306. Part, Lee, Y., Won, D.: Enhancing of a password-based authentication scheme using smart cards. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5871 LNCS, pp. 879-886 (2009) 307. Patel, S.N., Pierce, J.S., Abowd, G.D.: A gesture-based authentication scheme for untrusted public terminals. In: Proceedings of the 17th annual ACM symposium on User interface software and technology, pp. 157-160. ACM, (2004) 308. Pham, T., Ma, W., Tran, D., Nguyen, P., Phung, D.: Multi-factor EEG-based user authentication. In: Proceedings of the International Joint Conference on Neural Networks, pp. 4029-4034. (2014) 309. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: A novel smart card mutual authentication scheme for session transfer among registered devices. In: Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013, pp. 1540-1547. (2013) 310. Polakis, I., Ilia, P., Maggi, F., Lancini, M., Kontaxis, G., Zanero, S., Ioannidis, S., Keromytis, A.D.: Faces in the distorting mirror: Revisiting photo-based social authentication. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 501-512. (2014) 311. Pooja, D., Shilpi, G., Sujata, S., Vinita, G.: SECURED AUTHENTICATION: 3D PASSWORD‖. International Journal of Engineering and Management Sciences 3, 242-245 (2012) 312. Portnoi, M., Shen, C.C.: Loc-Auth: Location-enabled authentication through attribute-based encryption. In: International Conference on Computing, Networking and Communications (ICNC), 2015, pp. 89-93. (2015) 313. Priyadharshini, S., Nivetha, D., Anjalikumari, T., Prakash, P.: Mobile controlled door locking system with two-factor authentication. Advances in Intelligent Systems and Computing, vol. 398, pp. 133-139 (2016) 314. Pu, Q., Wang, J., Zhao, R.: Strong Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 36, 2609-2619 (2012) 315. Pu, Q.: An improved two-factor authentication protocol. In: 2010 International Conference on MultiMedia and Information Technology, MMIT 2010, pp. 223-226. (2010) 316. Qian, H., Surapaneni, C.S., Dispensa, S., Medhi, D.: Service management architecture and system capacity design for phonefactorTM-A two-factor authentication service. In: 2009 IFIP/IEEE International Symposium on Integrated Network Management, IM 2009, pp. 73-80. (2009) 317. Qian, H., Surapaneni, C.S., Ray, M., Dispensa, S., Medhi, D.: DReaM-Cache: Distributed real-time transaction memory cache to support two-factor authentication services and its reliability. In: Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010, pp. 333-340. (2010) 318. Qu, J., Tan, X.L.: Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. Journal of Electrical and Computer Engineering 2014, (2014) 319. Ramasamy, R., Muniyandi, A.P.: An Efficient Password Authentication Scheme for Smart Card. IJ Network Security 14, 180-186 (2012) 320. Rao, T.V.N., Vedavathi, K.: Authentication using mobile phone as a security token. IJCSET 1, 569-574 (2011) 321. Ren, X., Wu, X.-W., Tang, K.: TSPass: A Dynamic User Authentication Scheme Based On Time and Space. IJCSNS 12, 45 (2012) 322. Resende, A.C.D., Mochetti, K., Aranha, D.F.: PUF-based mutual multifactor entity and transaction authentication for secure banking. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9542, pp. 77-96 (2016) 323. Rhee, H.S., Kwon, J.O., Lee, D.H.: A remote user authentication scheme without using smart cards. Computer Standards & Interfaces 31, 6-13 (2009) 324. Sabzevar, A.P., Stavrou, A.: Universal multi-factor authentication using graphical passwords. In: SITIS 2008 - Proceedings of the 4th International Conference on Signal Image Technology and Internet Based Systems, pp. 625- 632. (2008) 325. Sarier, N.D.: A survey of distributed biometric authentication systems. In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), pp. 129-140. (2009) 326. Sarier, N.D.: Improving the accuracy and storage cost in biometric remote authentication schemes. Journal of Network and Computer Applications 33, 268-274 (2010) 327. Sarika, T., Nawaz, S.S.: Multi-factor user authentication in wireless sensor networks. Int J Comput Sci Telecommun 2, 59-63 (2011) 328. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Secure and Light Weight Authentication Service in Hadoop using One Time Pad. Procedia Computer Science 50, 81-86 (2015) 329. Saxena, A.: Dynamic authentication: Need than a choice. In: 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE, pp. 214-218. (2007) 330. Selcuk Uluagac, A., Liu, W., Beyah, R.: A multi-factor re-authentication framework with user privacy. In: 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 504-505. (2014) 331. Sery, P.: Tighter SSH security with two-factor authentication. Linux J. 2006, 3 (2006) 332. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security 22, 591-595 (2003) 333. Shiuh-Jeng, W., Jin-Fu, C.: Smart card based secure password authentication scheme. Computers & Security 15, 231-237 (1996) 334. Shunmuganathan, S., Saravanan, R.D., Palanichamy, Y.: Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Canadian Journal of Electrical and Computer Engineering 38, 20-30 (2015) 335. Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Cryptanalysis and improvement of ‘a secure authentication scheme for telecare medical information system’ with nonce verification. Peer-to-Peer Networking and Applications (2015) 336. Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Smart environment as a service: Three factor cloud based user authentication for telecare medical information system. Journal of Medical Systems 38, (2014) 337. Singh, A., Rishi, R.: An improved two-factor authenticated key exchange protocol in public wireless LANs. In: International Conference on Advanced Computing and Communication Technologies, ACCT, pp. 226-230. (2013) 338. Singh, V., Dahiya, P., Singh, S.: Smart card based password authentication and user anonymity scheme using ECC and steganography. In: Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, pp. 1614-1621. (2014) 339. Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32, 321- 325 (2010) 340. Sood, S.K., Sarje, A.K., Singh, K.: A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications 34, 609-618 (2011) 341. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Liao et al.'s authentication scheme using smart cards. In: Advance Computing Conference (IACC), 2010 IEEE 2nd International, pp. 240-245. IEEE, (2010) 342. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.'s authentication scheme using smart cards. In: Proceedings of the third annual ACM Bangalore conference, pp. 15. ACM, (2010) 343. Sood, S.K.: An improved and secure smart card based dynamic identity authentication protocol. International Journal of Network Security 14, 39-46 (2012) 344. Stockdale, J., Vakaloudis, A., Escaño, J.M., Liang, J., Cahill, B.: A fuzzy system for three-factor, non-textual authentication. Studies in Computational Intelligence, vol. 591, pp. 125-137 (2015) 345. Suh, J.: Veri-Pen: A Pen-based Identification Through Natural Biometrics Extraction. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016) 346. Sukarno, P., Bhattacharjee, N.: Authentication Architecture Based on Crypto-biometric Systems. In: Proceedings of the 2008 International Conference on Security and Management, SAM 2008, pp. 638-644. (2008) 347. Sun, D.-Z., Huai, J.-P., Sun, J.-Z., Li, J.-X., Zhang, J.-W., Feng, Z.-Y.: Improvements of Juang's password- authenticated key agreement scheme using smart cards. IEEE Transactions on industrial electronics 56, 2284-2291 (2009) 348. Sun, D.Z., Li, J.X., Feng, Z.Y., Cao, Z.F., Xu, G.Q.: ON the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing 17, 895-905 (2013) 349. Sun, H.-M., Chen, Y.-H., Lin, Y.-H.: oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE transactions on information forensics and security 7, 651-663 (2012) 350. Sun, J., Zhang, R., Zhang, J., Zhang, Y.: TouchIn: Sightless two-factor authentication on multi-touch mobile devices. In: 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 436-444. (2014) 351. Svogor, I., Kisasondi, T.: Two factor authentication using EEG augmented passwords. In: Proceedings of the International Conference on Information Technology Interfaces, ITI, pp. 373-378. (2012) 352. Tan, Z.: A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. Journal of Medical Systems 38, (2014) 353. Tan, Z.: An authentication and key agreement scheme with key confirmation and privacy-preservation for multi- server environments. Journal of Computers 6, 2295-2301 (2011) 354. Tan, Z.: An efficient biometrics-based authentication scheme for telecare medicine information systems. network 2, 200-204 (2013) 355. Tan, Z.: Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks. Advances in Information Sciences and Service Sciences 3, 117-126 (2011) 356. Tang, H.B., Liu, X.S., Li, Y.: Cryptanalysis of a biometric-based remote user authentication scheme. In: International Conference on Information Science and Control Engineering 2012 (ICISCE 2012), IET, pp. 1-5. (2012) 357. Tang, H.B., Zhu, Z.J., Gao, Z.W., Li, Y.: A secure biometric-based authentication scheme using smart card. In: International Conference on Cyberspace Technology (CCT 2013), pp. 39-43. (2013) 358. Tian, X., Zhu, R.W., Wong, D.S.: Improved Efficient Remote User Authentication Schemes. IJ Network Security 4, 149-154 (2007) 359. Ting, S.L., Tsang, A.H.C.: A two-factor authentication system using Radio Frequency Identification and watermarking technology. Computers in Industry 64, 268-279 (2013) 360. Tiwari, A., Sanyal, S., Abraham, A., Knapskog, S.J., Sanyal, S.: A multi-factor security protocol for wireless payment-secure web authentication using mobile devices. arXiv preprint arXiv:1111.3010 (2011) 361. Tritilanunt, S., Thanyamanorot, N., Ritdecha, N.: A secure authentication protocol using HOTP on USB storage devices. In: International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), 2014, pp. 1908-1912. (2014) 362. Tsague, H.D., Nelwamondo, F., Msimang, N.: An advanced mutual-authentication algorithm using 3DES for smart card systems. In: Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012, pp. 660-666. (2012) 363. Tsaur, W.-J., Li, J.-H., Lee, W.-B.: An efficient and secure multi-server authentication scheme with key agreement. Journal of Systems and Software 85, 876-882 (2012) 364. Tsaur, W.-J., Wu, C.-C., Lee, W.-B.: A smart card-based remote scheme for password authentication in multi-server Internet services. Computer Standards & Interfaces 27, 39-51 (2004) 365. Turkanovic, M., Holbl, M.: An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektronika ir Elektrotechnika 19, 109-116 (2013) 366. Ullah, S., Xuefeng Dr, Z., Feng Dr, Z.: TCLOUD: A Multi - factor access control framework for cloud computing. International Journal of Security and its Applications 7, 15-26 (2013) 367. Urien, P.: Introducing TLS-PSK authentication for EMV devices. In: Collaborative Technologies and Systems (CTS), 2010 International Symposium on, pp. 371-377. (2010) 368. Uymatiao, M.L.T., Yu, W.E.S.: Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore. In: ICIST 2014 - Proceedings of 2014 4th IEEE International Conference on Information Science and Technology, pp. 225-229. (2014) 369. Vaidya, B., Makrakis, D., Mouftah, H.: Two‐factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks (2012) 370. Vaidya, B., Makrakis, D., Mouftah, H.: Two-factor mutual authentication with key agreement in wireless sensor networks. Security and Communication Networks 9, 171-183 (2016) 371. Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010, pp. 600-606. (2010) 372. Vaka, V., Lindskog, D., Zavarsky, P.: Enhancing of biometric authentication with pass strings and cryptographic checksums. In: 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 170-170. (2016) 373. Virgile, K., Yu, H.: Securing cloud emails using two factor authentication based on password/apps in cloud computing. International Journal of Security and its Applications 9, 121-130 (2015) 374. Wang, B., Wang, Y., Zhang, H.: A new secure password authentication scheme using smart cards. Wuhan University Journal of Natural Sciences 13, 739-743 (2008) 375. Wang, D., Ma, C.-g., Wang, P., Chen, Z.: Robust smart card based password authentication scheme against smart card security breach. (2012) 376. Wang, D., Ma, C.-g.: Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19, 104-114 (2012) 377. Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences 321, 162-178 (2015) 378. Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 3136-3141. (2014) 379. Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology 65, 896-911 (2016) 380. Wang, F., Zhang, Y., Xu, Y., Wu, L., Diao, B.: A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks. In: International Conference on Computing, Networking and Communications (ICNC), 2014, pp. 1096-1102. IEEE, (2014) 381. Wang, N.-W., Chao, H.-C., Chen, I.-Y., Huang, Y.-M.: A novel user’s authentication scheme for pervasive on-line media services. Telecommunication Systems 44, 181-190 (2010) 382. Wang, R.C., Juang, W.S., Lei, C.L.: A robust authentication scheme with user anonymity for wireless environments. International Journal of Innovative Computing, Information and Control 5, 1069-1080 (2009) 383. Wang, R.-C., Juang, W.-S., Lei, C.-L.: Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 34, 274-280 (2011) 384. Wang, Y.-y., Liu, J.-y., Xiao, F.-x., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer communications 32, 583-585 (2009) 385. Wangsuk, K., Anusas-amornkul, T.: Trajectory Mining for Keystroke Dynamics Authentication. Procedia Computer Science 24, 175-183 (2013) 386. Wazid, M., Das, A.K., Kumari, S., Li, X., Wu, F.: Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Security and Communication Networks (2016) 387. Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems 36, 3597-3604 (2012) 388. Wei, J., Liu, W., Hu, X.: Cryptanalysis and improvement of a robust smart card authentication scheme for multi- server architecture. Wireless Personal Communications 77, 2255-2269 (2014) 389. Wen, F., Guo, D.: An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 38, 1-11 (2014) 390. Wen, F., Li, X., Cui, S.: An improved dos-resistant id-based password authentication scheme without using smart card. Journal of Electronics (China) 28, 580-586 (2011) 391. Wen, F., Susilo, W., Yang, G.: Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards. Wireless Personal Communications 80, 1747-1760 (2015) 392. Wen, F.: A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System. Journal of Medical Systems 38, 1-7 (2014) 393. Wen, F.: A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems 37, 1-9 (2013) 394. Wong, F.W.M.H., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. In: Signals, Systems and Computers, 2001. Conference Record of the Thirty-Fifth Asilomar Conference on, pp. 911-915. IEEE, (2001) 395. Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 12, 722-723 (2008) 396. Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Networking and Applications 1-15 (2015) 397. Wu, F., Xu, L., Kumari, S., Li, X.: A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Computers and Electrical Engineering 45, 274-285 (2015) 398. Wu, F., Xu, L., Kumari, S., Li, X.: An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems (2015) 399. Wu, S., Kang, F., Pu, Q.: Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Internet Technology 13, 411-418 (2012) 400. Wu, S., Zhu, Y.: Improved two-factor authenticated key exchange protocol. Int. Arab J. Inf. Technol. 8, 430-439 (2011) 401. Wu, T.-C.: Remote login authentication scheme based on a geometric approach. Computer Communications 18, 959- 963 (1995) 402. Xie, M., Li, Y., Yoshigoe, K., Seker, R., Bian, J.: CamAuth: Securing Web Authentication with Camera. In: 2015 IEEE 16th International Symposium on High Assurance Systems Engineering, pp. 232-239. (2015) 403. Xie, Q., Dong, N., Wong, D.S., Hu, B.: Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol. International Journal of Communication Systems (2014) 404. Xie, Q., Dong, N., Wong, D.S., Hu, B.: Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems 29, 478-487 (2016) 405. Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications 74, 601-614 (2014) 406. Xie, Q., Liu, W.-h., Wang, S.-b., Hu, B., Dong, N., Yu, X.-y.: Robust password and smart card based authentication scheme with smart card revocation. Journal of Shanghai Jiaotong University (Science) 19, 418-424 (2014) 407. Xie, Q., Zhang, J., Dong, N.: Robust Anonymous Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 37, 1-8 (2013) 408. Xie, Q.: Improvement of a security enhanced one-time two-factor authentication and key agreement scheme. Scientia Iranica 19, 1856-1860 (2012) 409. Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31, 723-728 (2009) 410. Xu, L., Wu, F.: An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Security and Communication Networks 8, 245-260 (2015) 411. Xu, L., Wu, F.: Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care. Journal of Medical Systems 39, 1-9 (2015) 412. Xu, Q., Huang, P., Yang, T.: An enhanced biometrics-key-based remote user authentication scheme with smart card. Jisuanji Yanjiu yu Fazhan/Computer Research and Development 52, 2645-2655 (2015) 413. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L.: A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. Journal of Medical Systems 38, (2014) 414. yang, C.-C., Wang, R.-C.: An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. SIGOPS Oper. Syst. Rev. 38, 91-96 (2004) 415. Yang, D., Yang, B.: A biometric password-based multi-server authentication scheme with smart card. In: International Conference on Computer Design and Applications (ICCDA), 2010, pp. V5-554-V555-559. IEEE, (2010) 416. Yang, D., Yang, B.: A new password authentication scheme using fuzzy extractor with smart card. In: International Conference on Computational Intelligence and Security, 2009. CIS'09., pp. 278-282. IEEE, (2009) 417. Yang, D.Y.B., Yang, B.: A novel multi-factor authenticated key exchange scheme with privacy preserving. Journal of Internet Services and Information Security 1, 44-56 (2011) 418. Yang, G., Wong, D.S., Wang, H., Deng, X.: Formal analysis and systematic construction of two-factor authentication scheme (short paper). In: International Conference on Information and Communications Security, pp. 82-91. Springer, (2006) 419. Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 74, 1160-1172 (2008) 420. Yang, L., Ma, J.-F., Jiang, Q.: Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. IJ Network Security 14, 156-163 (2012) 421. Yang, W.-H., Shieh, S.-P.: Password authentication schemes with smart cards. Computers & Security 18, 727-733 (1999) 422. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W., Zou, D.: Efficient password-based two factors authentication in cloud computing. International Journal of Security and its Applications 6, 143-148 (2012) 423. Yassin, A.A., Jin, H., Ibrahim, A., Zou, D.: Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012, pp. 282-289. (2012) 424. Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Information Security 7, 247-252 (2013) 425. Yeole, A.S.: Proposal for novel 3D password for providing authentication in critical web applications. In: International Conference and Workshop on Emerging Trends in Technology 2011, ICWET 2011 - Conference Proceedings, pp. 663-666. (2011) 426. Yildiz, M., M, G., x0F, kt, x0Fc, rk: Combining Biometric ID Cards and Online Transactions. In: Fourth International Conference on Digital Society, 2010. ICDS '10., pp. 20-24. (2010) 427. Yin, D.B.M., Kamal, M.I., Azmanuddin, N.S., Ali, S.H.S., Othman, A.T., Chik, R.Z.W.: Electronic Door Access Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface- based Face Recognition using Principal Component Analysis. Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM, Danang, Viet Nam (2016) 428. Yoo, S., Shin, S.J., Ryu, D.H.: An innovative two factor authentication method: The QRLogin system. International Journal of Security and its Applications 7, 293-302 (2013) 429. Yoo, S.G., Lee, H., Kim, J.: A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2013, (2013) 430. Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: An improvement of Hwang–Lee–Tang's simple remote user authentication scheme. Computers & Security 24, 50-56 (2005) 431. Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 612-614 (2004) 432. Yoon, E.J., Yoo, K.Y.: A three-factor authenticated key agreement scheme for SIP on elliptic curves. In: Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, pp. 334-339. (2010) 433. Yoon, E.-J., Yoo, K.-Y.: Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. The Journal of Supercomputing 63, 235-255 (2013) 434. Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Transactions on Information Forensics and Security 9, 2302-2313 (2014) 435. Yu, Z., Jingchun, X., Dake, H.: Trusted user authentication scheme combining password with fingerprint for mobile devices. In: Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on, pp. 1-8. (2008) 436. Yuan, J.-J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems 55, 105-113 (2014) 437. Zhang, L., Tang, S., Chen, J., Zhu, S.: Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications 81, 53-75 (2015) 438. Zhang, M., Zhang, J., Zhang, Y.: Remote three-factor authentication scheme based on Fuzzy extractors. Security and Communication Networks 8, 682-693 (2015) 439. Zhou, W., Yue, Y., Yu, B.: Research of multi-factor identity authentication scheme for ZigBee network nodes. Xitong Fangzhen Xuebao / Journal of System Simulation 27, 762-769 (2015) 440. Zhu, H., Lin, X., Zhang, Y., Lu, R.: Duth: A user-friendly dual-factor authentication for Android smartphone devices. Security and Communication Networks 8, 1213-1222 (2015) 441. Zhu, Z.: An Efficient Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 36, 3833-3838 (2012) 442. Ziauddin, S.: A two-factor mutual authentication scheme using biometrics and smart card. Communications in Computer and Information Science, vol. 58, pp. 209-216 (2009)

Acceptance Topic 3 (AT3): Comparison and Selection Criteria

1. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., Sakurai, K.: Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications 61, 59-80 (2016) 2. Anwar, M., Imran, A.: A comparative study of graphical and alphanumeric passwords for mobile device authentication. In: CEUR Workshop Proceedings, pp. 13-18. (2015) 3. Borde, D.d.: Selecting a two-factor authentication system. Network Security 2007, 17-20 (2007) 4. Bruun, A., Jensen, K., Kristensen, D.: Usability of single-and multi-factor authentication methods on tabletops: A comparative study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8742, pp. 299-306 (2014) 5. Choksi, S.: Comparative Study on Authentication Schemes for Cloud Computing. In: International Journal of Engineering Development and Research. IJEDR, (2014) 6. Gunson, N., Marshall, D., Morton, H., Jack, M.: User perceptions of security and usability of single-factor and two- factor authentication in automated telephone banking. Computers and Security 30, 208-220 (2011) 7. Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: Proceedings of the 2nd International Symposium on Human Aspects of Information Security and Assurance, HAISA 2008, pp. 80-93. (2008) 8. Hua, R., Zhang, R., Li, D.: Security analysis of authentication schemes in M-commerce based on fuzzy comprehensive evaluation. In: ICISO 2010 - Proceedings of the 12th International Conference on Informatics and Semiotics in Organisations, IFIP WG8.1 Working Conference, pp. 245-251. (2010) 9. Jansen, W.: Authenticating users on handheld devices. In: Proceedings of the Canadian Information Technology Security Symposium, pp. 1-12. (2003) 10. Kiljan, S., Vranken, H., van Eekelen, M.: Evaluation of transaction authentication methods for online banking. Future Generation Computer Systems (2016) 11. Kumari, S., Khan, M.K., Atiquzzaman, M.: User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks 27, 159-194 (2015) 12. Madhusudhan, R., Mittal, R.C.: Dynamic ID-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications 35, 1235-1248 (2012) 13. O'Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91, 2021-2040 (2003) 14. Park, K.C., Shin, J.W., Lee, B.G.: Analysis of Authentication Methods for Smartphone Banking Service using ANP. TIIS 8, 2087-2103 (2014) 15. Ruoti, S., Roberts, B., Seamons, K.: Authentication Melee: A Usability Analysis of Seven Web Authentication Systems. Proceedings of the 24th International Conference on World Wide Web. ACM, Florence, Italy (2015) 16. Skracic, K., Pale, P., Jeren, B.: Knowledge based authentication requirements. In: 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2013 - Proceedings, pp. 1116-1120. (2013) 17. Zviran, M., Erlich, Z.: Identification and authentication: technology and implementation issues. Communications of the Association for Information Systems 17, 4 (2006)

Acceptance Topic 4 (AT4): Decision Frameworks

1. Altinkemer, K., Wang, T.: Cost and benefit analysis of authentication systems. Decision Support Systems 51, 394- 404 (2011) 2. Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553- 567. IEEE, (2012) 3. Eliasson, C., Fiedler, M., Jørstad, I.: A criteria-based evaluation framework for authentication schemes in IMS. In: Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 865-869. (2009) 4. Forget, A., Chiasson, S., Biddle, R.: User-centred authentication feature framework. Information and Computer Security 23, 497-515 (2015) 5. Guel, M.D.: A Framework for Choosing Your Next Generation Authentication/Authorization System. Information Security Technical Report 7, 63-78 (2002) 6. Kim, J.Y.: Efficiency of Paid Authentication Methods for Mobile Devices. Wireless Personal Communications 1-9 (2016) 7. Palmer, A.J.: Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA). Computers and Security 29, 785-806 (2010) 8. Wang, D., Gu, Q., Cheng, H., Wang, P.: The Request for Better Measurement: A Comparative Evaluation of Two- Factor Authentication Schemes. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, Xi'an, China (2016)