68
Accepted Articles for Authentication Schemes and Methods: a Systematic Literature Review Acceptance Topic 1 (AT1): Authentication Schemes 1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment. International Journal of Security and Its Applications (IJSIA) 9, 35-46 (2015) 2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognition Letters (2015) 3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A comparative approach between cepstral features for human authentication using heart sounds. Signal, Image and Video Processing 10, 843-851 (2016) 4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: User authentication through biometric sensors and decision fusion. In: 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. (2013) 5. Adida, B.: EmID: Web authentication by email address. In: Proceedings of Web. (2008) 6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools and Applications 1-19 (2016) 7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical passwords for augmenting, not replacing, text passwords. Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New Orleans, Louisiana, USA (2013) 8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015) 9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In: 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 369-374. (2013) 10. Ali, A.M.: Zero footprint secure internet authentication using network smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3928 LNCS, pp. 91-104 (2006) 11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke Biometric Systems for User Authentication. Journal of Signal Processing Systems 1-16 (2016)

colvin.chillan.ubiobio.clcolvin.chillan.ubiobio.cl/mcaro/Accepted Articles for Auth…  · Web viewAccepted Articles for Authentication Schemes and Methods: a Systematic Literature

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Accepted Articles for Authentication Schemes and Methods: a Systematic Literature Review

Acceptance Topic 1 (AT1): Authentication Schemes

1. Abdellaoui, A., Khamlichi, Y.I., Chaoui, H.: Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment. International Journal of Security and Its Applications (IJSIA) 9, 35-46 (2015)

2. Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognition Letters (2015)

3. Abo-Zahhad, M., Farrag, M., Abbas, S.N., Ahmed, S.M.: A comparative approach between cepstral features for human authentication using heart sounds. Signal, Image and Video Processing 10, 843-851 (2016)

4. Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: User authentication through biometric sensors and decision fusion. In: 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. (2013)

5. Adida, B.: EmID: Web authentication by email address. In: Proceedings of Web. (2008)

6. Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools and Applications 1-19 (2016)

7. Akpulat, M., Bicakci, K., Cil, U.: Revisiting graphical passwords for augmenting, not replacing, text passwords. Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New Orleans, Louisiana, USA (2013)

8. Al-Ameen, M.N., Wright, M., Scielzo, S.: Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015)

9. Al-Assam, H., Rashid, R., Jassim, S.: Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In: 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, pp. 369-374. (2013)

10. Ali, A.M.: Zero footprint secure internet authentication using network smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3928 LNCS, pp. 91-104 (2006)

11. Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke Biometric Systems for User Authentication. Journal of Signal Processing Systems 1-16 (2016)

12. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58, 108-116 (2013)

13. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: IPAS: Implicit password authentication system. In: IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), 2011, pp. 430-435. IEEE, (2011)

14. Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security (WorldCIS), pp. 223-225. (2011)

15. Alrawais, A., Alhothaily, A., Cheng, X.: Secure authentication scheme using dual channels in rogue access point environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8491, pp. 554-563 (2014)

16. Alzomai, M., Alfayyadh, B., Jøsang, A.: Display security for online transactions: SMS-based authentication scheme. In: 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. (2010)

17. Alzomai, M., Jøsang, A., McCullagh, A., Foo, E.: Strengthening SMS-based authentication through usability. In: Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, pp. 683-688. (2008)

18. Amin, R., Biswas, G.P.: A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. Journal of Medical Systems 39, 1-17 (2015)

19. Amin, R., Biswas, G.P.: Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card. Arabian Journal for Science and Engineering 40, 3135-3149 (2015)

20. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical Systems 39, 1-18 (2015)

21. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I., Cameron, D., Fischer, M.H.: VIP: a visual approach to user authentication. Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, Trento, Italy (2002)

22. Annapurani, K., Sadiq, M.A.K., Malathy, C.: Fusion of shape of the ear and tragus – A unique feature extraction method for ear authentication system. Expert Systems with Applications 42, 649-656 (2015)

23. Antal, M., Szabó, L.Z.: Biometric Authentication Based on Touchscreen Swipe Patterns. Procedia Technology 22, 862-869 (2016)

24. Arif, A., Pahud, M., Hinckley, K., Buxton, W.: A tap and gesture hybrid method for authenticating smartphone users. Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services. ACM, Munich, Germany (2013)

25. Arthur Evans, Jr., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17, 437-442 (1974)

26. Assaad, F.S., Serpen, G.: Transformation based Score Fusion Algorithm for Multi-modal Biometric User Authentication through Ensemble Classification. Procedia Computer Science 61, 410-415 (2015)

27. Atallah, M.J., Frikken, K.B., Goodrich, M.T., Tamassia, R.: Secure biometric authentication for weak computational devices. In: Lecture Notes in Computer Science, pp. 357-371. (2005)

28. Awasthi, A.K., Lal, S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics 49, 1246-1248 (2003)

29. Awasthi, A.K., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 583-586 (2004)

30. Awasthi, A.K., Srivastava, K.: A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems 37, 1-4 (2013)

31. Aykut, M., Ekinci, M.: Developing a contactless palmprint authentication system by introducing a novel ROI extraction method. Image and Vision Computing 40, 65-74 (2015)

32. Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making 7, 243-256 (2008)

33. Babu, B.S., Venkataram, P.: An authentication scheme for personalized mobile multimedia services: A cognitive agents based approach. In: Proceedings of Future Generation Communication and Networking, FGCN 2007, pp. 167-172. (2007)

34. Babu, B.S., Venkataram, P.: Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS). Computer Communications 31, 4060-4071 (2008)

35. Bai, Z., Hatzinakos, D.: LBP-based biometric hashing scheme for human authentication. In: 11th International Conference on Control, Automation, Robotics and Vision, ICARCV 2010, pp. 1842-1847. (2010)

36. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Computers & Security 43, 77-89 (2014)

37. Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information Conference (SAI), 2014, pp. 601-606. (2014)

38. Bandyopadhyay, S.K., Bhattacharyya, D., Das, P.: User authentication by Secured Graphical Password Implementation. In: Information and Telecommunication Technologies, 2008. APSITT. 7th Asia-Pacific Symposium on, pp. 7-12. (2008)

39. Banerjee, P.K., Chandra, J.K., Datta, A.K.: Feature based optimal trade-off parameter selection of frequency domain correlation filter for real time face authentication. Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, Rourkela, Odisha, India (2011)

40. Bansal, M., Hanmandlu, M., Kumar, P.: IRIS based authentication using local principal independent components. Optik - International Journal for Light and Electron Optics 127, 4808-4814 (2016)

41. Bashir, M., Scharfenberg, G., Kempf, J.: Person Authentication by Handwriting in air using a Biometric Smart Pen Device. BIOSIG 191, 219-226 (2011)

42. Bennet, D., Arumugaperumal, S.: Fingerprint based multi-server authentication system. In: International Conference on Electronics Computer Technology (ICECT), 2011 3rd, pp. 115-119. (2011)

43. Best, D.S., Duchowski, A.T.: A rotary dial for gaze-based PIN entry. Proceedings of the Ninth Biennial ACM Symposium on Eye Tracking Research & Applications. ACM, Charleston, South Carolina (2016)

44. Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework. Journal of Medical Informatics & Technologies 23, (2014)

45. Bianchi, A., Oakley, I., Kwon, D.S.: The secure haptic keypad: a tactile password system. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta, Georgia, USA (2010)

46. Bianchi, A., Oakley, I., Kwon, D.S.: Using mobile device screens for authentication. Proceedings of the 23rd Australian Computer-Human Interaction Conference. ACM, Canberra, Australia (2011)

47. Bicakci, K., Oorschot, P.C.v.: A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. Proceedings of the 2011 workshop on New security paradigms workshop. ACM, Marin County, California, USA (2011)

48. Binu, S., Misbahuddin, M., Raj, P.: A Single Sign on based secure remote user authentication scheme for Multi-Server Environments. In: International Conference on Computer and Communications Technologies (ICCCT), 2014, pp. 1-6. (2014)

49. Borisov, A.: A Novel Approach for User Authentication to Industrial Components Using QR Codes. In: Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, pp. 61-66. IEEE, (2015)

50. Boudguiga, A., Laurent, M.: An ID-based authentication scheme for the IEEE 802.11s mesh network. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010, pp. 256-263. (2010)

51. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know. Proceedings of the 13th ACM conference on Computer and communications security. ACM, Alexandria, Virginia, USA (2006)

52. Brown, M., Doswell, F.R.: Using passtones instead of passwords. Proceedings of the 48th Annual Southeast Regional Conference. ACM, Oxford, Mississippi (2010)

53. Bulling, A., Alt, F., Schmidt, A.: Increasing the security of gaze-based cued-recall graphical passwords using saliency masks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012)

54. Cagalj, M., Perkovic, T., Bugaric, M.: Timing attacks on cognitive authentication schemes. IEEE Transactions on Information Forensics and Security 10, 584-596 (2015)

55. Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Proceedings of the second ACM conference on Wireless network security. ACM, Zurich, Switzerland (2009)

56. Carter, N.J.: Graphical Passwords for Older Computer Users. Adjunct Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. ACM, Daegu, Kyungpook, Republic of Korea (2015)

57. Catuogno, L., Galdi, C.: On user authentication by means of video events recognition. Journal of Ambient Intelligence and Humanized Computing 5, 909-918 (2014)

58. Chang, C.-C., Hsueh, W.-Y., Cheng, T.-F.: A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wireless Personal Communications 89, 447-465 (2016)

59. Chang, Y.-F., Chang, C.-C., Kuo, J.-Y.: A secure one-time password authentication scheme using smart cards without limiting login times. SIGOPS Oper. Syst. Rev. 38, 80-90 (2004)

60. Chatzis, V., Bors, A.G., Pitas, I.: Multimodal decision-level fusion for person authentication. IEEE transactions on systems, man, and cybernetics-part a: systems and humans 29, 674-680 (1999)

61. Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K.: An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. Journal of Medical Systems 39, 1-12 (2015)

62. Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools and Applications 1-21 (2016)

63. Chelliah, B., Geetha, S.: Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. Communications in Computer and Information Science, vol. 420 CCIS, pp. 461-472 (2014)

64. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. International Journal of Communication Systems 27, 377-389 (2014)

65. Chen, C.-L., Deng, Y.-Y.: Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence 22, 1284-1291 (2009)

66. Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. Proceedings of the 12th annual international conference on Mobile systems, applications, and services. ACM, Bretton Woods, New Hampshire, USA (2014)

67. Chen, T., Huang, S.H.: Tree parity machine-based one-time password authentication schemes. In: Proceedings of the International Joint Conference on Neural Networks, pp. 257-261. (2008)

68. Chen, T.-Y., Lee, C.-C., Hwang, M.-S., Jan, J.-K.: Towards secure and efficient user authentication scheme using smart card for multi-server environments. The Journal of Supercomputing 66, 1008-1032 (2013)

69. Chen, Y., Chou, J.-S., Sun, H.-M.: A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52, 2373-2380 (2008)

70. Chen, Y., Chou, J.-S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research 15, 97-120 (2015)

71. Chen, Y., Shu, J., Yang, F., Chen, H.: User authentication and data cryptograph system based on biometric key for wireless sensor networks. Journal of Computational Information Systems 9, 3949-3959 (2013)

72. Cheng, F.: A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password Token. In: 2010 IEEE 34th Annual Computer Software and Applications Conference, pp. 147-154. (2010)

73. Cheng, F.: Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm. Mobile Networks and Applications 16, 304-336 (2011)

74. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication scheme for remote user login and verification. International Journal of Innovative Computing, Information and Control 8, 5499-5511 (2012)

75. Cheul Shin, K., Jong Oh, K.: Smartcard-based remote authentication scheme preserving user anonymity. International Journal of Information Processing and Management 4, 10-18 (2013)

76. Chiang, H.-Y., Chiasson, S.: Improving user authentication on mobile devices: a touchscreen graphical password. Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services. ACM, Munich, Germany (2013)

77. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp. 245-248. IEEE, (2005)

78. Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with Applications 69, 58-65 (2015)

79. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications 34, 391-397 (2011)

80. Choi, K., Lee, C., Jeon, W., Lee, K., Won, D.: A mobile based anti-phishing authentication scheme using QR code. In: Proceedings - 2011 International Conference on Mobile IT-Convergence, ICMIC 2011, pp. 109-113. (2011)

81. Choi, S., Zage, D.: Addressing insider threat using “where you are” as fourth factor authentication. In: Security Technology (ICCST), 2012 IEEE International Carnahan Conference on, pp. 147-153. (2012)

82. Chou, J.-S.: An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing 70, 75-94 (2014)

83. Chowdhury, S., Poet, R., Mackenzie, L.: Passhint: memorable and secure authentication. Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014)

84. Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.: Outsourceable two-party privacy-preserving biometric authentication. Proceedings of the 9th ACM symposium on Information, computer and communications security. ACM, Kyoto, Japan (2014)

85. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249-259. ACM, (2011)

86. Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Computers & Security 39, Part B, 127-136 (2013)

87. Dabbah, M., Woo, W., Dlay, S.: Secure authentication for face recognition. In: Computational Intelligence in Image and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, pp. 121-126. IEEE, (2007)

88. Das, A.K., Bruhadeshwar, B.: An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. Journal of Medical Systems 37, 1-17 (2013)

89. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 35, 1646-1656 (2012)

90. Das, R.K., Jelil, S., Mahadeva Prasanna, S.R.: Development of Multi-Level Speech based Person Authentication System. Journal of Signal Processing Systems 1-13 (2016)

91. David, D.B., Rajappa, M., Karupuswamy, T., Iyer, S.P.: A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System. Wireless Personal Communications 85, 241-261 (2015)

92. De Luca, A., Hertzschuch, K., Hussmann, H.: ColorPIN: securing PIN entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103-1106. ACM, (2010)

93. De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: FIRME: Face and Iris Recognition for Mobile Engagement. Image and Vision Computing 32, 1161-1172 (2014)

94. De Marsico, M., Nappi, M., Riccio, D.: Face authentication with undercontrolled pose and illumination. Signal, Image and Video Processing 5, 401-413 (2011)

95. Denning, T., Bowers, K., Dijk, M.v., Juels, A.: Exploring implicit memory for painless password recovery. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada (2011)

96. Dhamija, R., Perrig, A.: Deja Vu-A User Study: Using Images for Authentication. In: USENIX Security Symposium, pp. 4-4. (2000)

97. Dhamija, R.: Hash visualization in user authentication. CHI '00 Extended Abstracts on Human Factors in Computing Systems. ACM, The Hague, The Netherlands (2000)

98. Dhondge, K., Choi, B.Y., Song, S., Park, H.: Optical Wireless authentication for smart devices using an onboard ambient light sensor. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1-8. (2014)

99. Ding, Y., Zhuang, D., Wang, K.: A study of hand vein recognition method. In: IEEE International Conference Mechatronics and Automation, 2005, pp. 2106-2110. IEEE, (2005)

100. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11, 383-396 (2013)

101. Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks 56, 3401-3416 (2012)

102. Drosou, A., Ioannidis, D., Moustakas, K., Tzovaras, D.: Spatiotemporal analysis of human activities for biometric authentication. Computer Vision and Image Understanding 116, 411-421 (2012)

103. Drosou, A., Ioannidis, D., Tzovaras, D., Moustakas, K., Petrou, M.: Activity related authentication using prehension biometrics. Pattern Recognition 48, 1743-1759 (2015)

104. Drosou, A., Moustakas, K., Tzovaras, D.: Event-based unobtrusive authentication using multi-view image sequences. Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in imagery streams. ACM, Firenze, Italy (2010)

105. Duc, B., Maître, G., Fischer, S., Bigün, J.: Person authentication by fusing face and speech information. In: International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 311-318. Springer, (1997)

106. Dutta, R.: Converting group key agreement protocol into password-based setting - Case study. Journal of Computers 2, 26-33 (2007)

107. Emam, A.H.M.: Additional authentication and authorization using registered email-ID for cloud computing. International Journal of Soft Computing and Engineering 3, 110-113 (2013)

108. English, R., Poet, R.: Towards a metric for recognition-based graphical password security. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 239-243 (2011)

109. Everts, M., Hoepman, J.-H., Siljee, J.: UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography. Proceedings of the 2013 ACM workshop on Digital identity management. ACM, Berlin, Germany (2013)

110. Fahmi, P.A., Kodirov, E., Choi, D.-J., Lee, G.-S., Azli, A.M.F., Sayeed, S.: Implicit authentication based on ear shape biometrics using smartphone camera during a call. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2272-2276. IEEE, (2012)

111. Failla, P., Sutcu, Y., Barni, M.: eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. Proceedings of the 12th ACM workshop on Multimedia and security. ACM, Roma, Italy (2010)

112. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security 24, 619-628 (2005)

113. Fan, J.W., Chan, C.W., Chang, Y.F.: A random increasing sequence hash chain and smart card-based remote user authentication scheme. In: ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing. (2013)

114. Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y.: An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications 1-9 (2016)

115. Fan, R., He, D.-j., Pan, X.-z., Ping, L.-d.: An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University SCIENCE C 12, 550-560 (2011)

116. Fan, Y.T., Su, G.P.: Design of two-way one-time-password authentication scheme based on true random numbers. In: 2nd International Workshop on Computer Science and Engineering, WCSE 2009, pp. 11-14. (2009)

117. Farash, M.S., Kumari, S., Bakhtiari, M.: Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications 75, 4485-4504 (2016)

118. Farash, M.S.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing 70, 987-1001 (2014)

119. Flior, E., Kowalski, K.: Continuous biometric user authentication in online examinations. In: ITNG2010 - 7th International Conference on Information Technology: New Generations, pp. 488-492. (2010)

120. Fong, S., Zhuang, Y., Fister, I.: A biometric authentication model using hand gesture images. BioMedical Engineering OnLine 12, 1-18 (2013)

121. Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Atlanta, Georgia, USA (2010)

122. Frankel, A.D., Maheswaran, M.: Feasibility of a socially aware authentication scheme. In: 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. (2009)

123. Fridman, L., Stolerman, A., Acharya, S., Brennan, P., Juola, P., Greenstadt, R., Kam, M.: Multi-modal decision fusion for continuous authentication. Computers & Electrical Engineering 41, 142-156 (2015)

124. Gafurov, D., Bours, P., Snekkenes, E.: User authentication based on foot motion. Signal, Image and Video Processing 5, 457-467 (2011)

125. Giot, R., El-Abed, M., Hemery, B., Rosenberger, C.: Unconstrained keystroke dynamics authentication with shared secret. Computers & Security 30, 427-445 (2011)

126. Gnanaraj, J.W.K., Ezra, K., Rajsingh, E.B.: Smart card based time efficient authentication scheme for global grid computing. Human-centric Computing and Information Sciences 3, 1-14 (2013)

127. Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. CHI '02 Extended Abstracts on Human Factors in Computing Systems. ACM, Minneapolis, Minnesota, USA (2002)

128. Gong, L., Pan, J., Liu, B., Zhao, S.: A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords. Journal of Computer and System Sciences 79, 122-130 (2013)

129. Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications 62, 1-8 (2016)

130. Gope, P., Hwang, T.: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Personal Communications 82, 2231-2245 (2015)

131. Goutham, R.A., Kim, D.S., Yoo, K.Y.: Implicit graphical password mutual authentication using mirror-image encryption. In: Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, pp. 218-223. (2014)

132. Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca, Spain (2015)

133. Grover, J., Hanmandlu, M.: Hybrid fusion of score level and adaptive fuzzy decision level fusions for the finger-knuckle-print based authentication. Applied Soft Computing Journal 31, 1-13 (2015)

134. Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through hand gesture recognition. International Journal of Information Security 11, 65-83 (2012)

135. Gugenheimer, J., Luca, A.D., Hess, H., Karg, S., Wolf, D., Rukzio, E.: ColorSnakes: Using Colored Decoys to Secure Authentication in Sensitive Contexts. Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, Copenhagen, Denmark (2015)

136. Gugenheimer, J., Schaub, F., Neiswander, G.M., Guneratne, E., Weber, M.: User Authentication for Rotary Knob Controlled In-car Applications. Proceedings of the 6th International Conference on Automotive User Interfaces and Interactive Vehicular Applications. ACM, Seattle, WA, USA (2014)

137. Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-10 (2015)

138. Gupta, P., Gupta, P.: Multi-modal fusion of palm-dorsa vein pattern for accurate personal authentication. Knowledge-Based Systems 81, 117-130 (2015)

139. Gupta, P., Srivastava, S., Gupta, P.: An accurate infrared hand geometry and vein pattern based authentication system. Knowledge-Based Systems 103, 143-155 (2016)

140. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., Fu, H.: MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication. Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces. ACM, Madeira, Portugal (2015)

141. Gurav, S.M., Gawade, L.S., Rane, P.K., Khochare, N.R.: Graphical password authentication: Cloud securing scheme. In: Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies, ICESC 2014, pp. 479-483. (2014)

142. Gurung, B., Prasad, P.W.C., Alsadoon, A., Elchouemi, A.: Enhanced Virtual Password Authentication Scheme Resistant to Shoulder Surfing. In: 2015 Second International Conference on Soft Computing and Machine Intelligence (ISCMI), pp. 134-139. (2015)

143. Gy, odor, Szendi, t., Imre, n.: Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems. Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks. ACM, Bodrum, Turkey (2010)

144. Habib, K., Torjusen, A., Leister, W.: A novel authentication framework based on bio-metric and radio fingerprinting for the IoT in eHealth. In: Proceedings of International Conference on Smart Systems, Devices and Technologies (SMART), pp. 32-37. (2014)

145. Hafizul Islam, S.K., Biswas, G.P.: Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling 57, 2703-2717 (2013)

146. Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a security token for unified authentication. In: 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), pp. 68-68. IEEE, (2007)

147. Hammouri, G., Öztürk, E., Sunar, B.: A tamper-proof and lightweight authentication scheme. Pervasive and Mobile Computing 4, 807-818 (2008)

148. Hang, A., Luca, A.D., Hussmann, H.: I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015)

149. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-7 (2013)

150. Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java SIM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6033 LNCS, pp. 229-236 (2010)

151. He, D., Chen, J., Chen, Y.: A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 5, 1423-1429 (2012)

152. He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321, 263-277 (2015)

153. He, D., Wang, D.: Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Systems Journal 9, 816-823 (2015)

154. Herzberg, A., Margulies, R.: My authentication album: Adaptive images-based login mechanism. In: IFIP International Information Security Conference, pp. 315-326. Springer, (2012)

155. Hintze, D., Findling, R.D., Muaaz, M., Koch, E., Ren, Mayrhofer: Cormorant: towards continuous risk-aware multi-modal cross-device authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, Osaka, Japan (2015)

156. Hoang, T., Choi, D., Nguyen, T.: Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. International Journal of Information Security 14, 549-560 (2015)

157. Hocquet, S., Ramel, J.-Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), pp. 224-229. IEEE, (2005)

158. Hong, F., Wei, M., You, S., Feng, Y., Guo, Z.: Waving Authentication: Your Smartphone Authenticate You on Motion Gesture. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Seoul, Republic of Korea (2015)

159. Hong, S.: Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques 1-7 (2015)

160. Hsieh, C.-Y., Lin, W.-Y.: Video-based human action and hand gesture recognition by fusing factored matrices of dual tensors. Multimedia Tools and Applications 1-20 (2016)

161. Hsieh, W.B., Leu, J.S.: Design of a time and location based One-Time Password authentication scheme. In: IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, pp. 201-206. (2011)

162. Hu, L.-l., Niu, X.-x., Yang, Y.-x.: Weaknesses and improvements of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 14, 91-94 (2007)

163. Huang, B., Dai, Y., Li, R., Tang, D., Li, W.: Finger-vein authentication based on wide line detector and pattern normalization. In: International Conference on Pattern Recognition (ICPR), 2010 20th, pp. 1269-1272. IEEE, (2010)

164. Huang, H.F., Chang, H.W., Yu, P.K.: Enhancement of timestamp-based user authentication scheme with smart card. International Journal of Network Security 16, 463-467 (2014)

165. Huang, Y., Huang, Z., Zhao, H., Lai, X.: A new One-time Password Method. IERI Procedia 4, 32-37 (2013)

166. Huang, Y.L., Lu, P.H., Tygar, J.D., Joseph, A.D.: OSNP: Secure wireless authentication protocol using one-time key. Computers & Security 28, 803-815 (2009)

167. Hussain, A., Bhuiyan, A., Mian, A., Ramamohanarao, K.: Biometric Security Application for Person Authentication Using Retinal Vessel Feature. In: International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2013, pp. 1-8. (2013)

168. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on Communications E85-B, 823-825 (2002)

169. Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 28-30 (2000)

170. Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. International Journal of Computer Mathematics 70, 657-666 (1999)

171. Hwang, S.-s., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers & Security 28, 85-93 (2009)

172. Hwang, S.-s., Lee, H.-j., Cho, S.: Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Systems with Applications 36, 10649-10656 (2009)

173. Imtiaz, H., Fattah, S.A.: A face recognition scheme using wavelet-based local features. In: Computers & Informatics (ISCI), 2011 IEEE Symposium on, pp. 313-316. (2011)

174. Imtiaz, H., Fattah, S.A.: A wavelet-domain local feature selection scheme for face recognition. In: International Conference on Communications and Signal Processing (ICCSP), 2011, pp. 448-451. (2011)

175. Islam, M., Hasan, M.M., Farhad, M.M., Tanni, T.R.: Human authentication process using finger knuckle surface with artificial Neural Networks based on a hybrid feature selection method. In: Proceeding of the 15th International Conference on Computer and Information Technology, ICCIT 2012, pp. 61-64. (2012)

176. Islam, M.S.: Heartbeat biometrics for remote authentication using sensor embedded computing devices. International Journal of Distributed Sensor Networks 2015, (2015)

177. Islam, S.K.H., Biswas, G.P.: Improved remote login scheme based on ECC. In: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 1221-1226. (2011)

178. Islam, S.K.H., Khan, M.K., Obaidat, M.S., Muhaya, F.T.B.: Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wireless Personal Communications 84, 2013-2034 (2015)

179. Jagadiswary, D., Saraswady, D.: Biometric Authentication Using Fused Multimodal Biometric. Procedia Computer Science 85, 109-116 (2016)

180. Jain, A., Hong, L., Kulkarni, Y.: A multimodal biometric system using fingerprint, face and speech. In: Proceedings of 2nd Int'l Conference on Audio-and Video-based Biometric Person Authentication, Washington DC, pp. 182-187. (1999)

181. Jain, A., Kanhangad, V.: Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recognition Letters 68, Part 2, 351-360 (2015)

182. Jakobsson, M., Yang, L., Wetzel, S.: Quantifying the security of preference-based authentication. Proceedings of the 4th ACM workshop on Digital identity management. ACM, Alexandria, Virginia, USA (2008)

183. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R.: Graphical password authentication scheme for embedded platform. Journal of Artificial Intelligence 7, 161-171 (2014)

184. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security and its Applications 7, 1-16 (2013)

185. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based user authentication scheme using smart cards in home networks. In: Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, pp. 294-294. IEEE, (2008)

186. Jiang, L., Li, X., Cheng, L.L., Guo, D.: Identity authentication scheme of cloud storage for user anonymity via USB token. In: Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification, ASID. (2013)

187. Jiang, P., Wen, Q., Li, W., Jin, Z., Zhang, H.: An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers of Computer Science 9, 142-156 (2015)

188. Jiang, Q., Li, G.S., Ma, J.F.: Security flaws and improvement of an ID-based wireless authentication scheme with anonymity. Tongxin Xuebao/Journal on Communications 31, 209-216 (2010)

189. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 68, 1477-1491 (2013)

190. Jiang, Q., Ma, J., Ma, Z., Li, G.: A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 37, 1-8 (2013)

191. Jin, Z., Teoh, A.B.J., Thian, S.O., Tee, C.: Typing dynamics biometric authentication through fuzzy logic. In: Proceedings - International Symposium on Information Technology 2008, ITSim. (2008)

192. Jo, J., Kim, Y., Lee, S.: Mindmetrics: Identifying users without their login IDs. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2121-2126. (2014)

193. Joshi, S.S., Phoha, V.V.: Competition between SOM clusters to model user authentication system in computer networks. In: Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007. (2007)

194. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33, 168-176 (1990)

195. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based authentication system for smartphones. Security and Communication Networks (2014)

196. Kang, B.J., Park, K.R.: A new multi-unit iris authentication based on quality assessment and score level fusion for mobile phones. Machine Vision and Applications 21, 541-553 (2010)

197. Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Information Sciences 308, 72-93 (2015)

198. Karuppiah, M., Saravanan, R.: A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks. Wireless Personal Communications 84, 2055-2078 (2015)

199. Khakzar, M., Pourghassem, H.: Human authentication algorithm using spectral feature of retinal fundus image. International Journal of Tomography and Simulation 28, 23-38 (2015)

200. Khamis, M., Alt, F., Hassib, M., Zezschwitz, E.v., Hasholzner, R., Bulling, A.: GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016)

201. Khan, G.N., Moessner, M.: Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Networks 21, 565-580 (2015)

202. Khan, M.K., Alghathbar, K., Zhang, J.: Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommunication Systems 47, 227-234 (2011)

203. Khot, R.A., Srinathan, K., Khot, R.A.: NAPTune: fine tuning graphical authentication. Proceedings of the 3rd International Conference on Human Computer Interaction. ACM, Bangalore, India (2011)

204. Khot, R.A., Srinathan, K., Kumaraguru, P.: MARASIM: a novel jigsaw based authentication scheme using tagging. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, BC, Canada (2011)

205. Khoury, E., El Shafey, L., McCool, C., Günther, M., Marcel, S.: Bi-modal biometric authentication on mobile phones in challenging conditions. Image and Vision Computing 32, 1147-1160 (2014)

206. Kikuchi, H., Nagai, K., Ogata, W., Nishigaki, M.: Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Computing 14, 529-536 (2010)

207. Kim, S.K., Chung, M.G.: More secure remote user authentication scheme. Computer Communications 32, 1018-1021 (2009)

208. Kotropoulos, C., Tefas, A., Pitas, I.: Frontal face authentication using morphological elastic graph matching. IEEE Transactions on Image Processing 9, 555-560 (2000)

209. Kratz, S., Aumi, M.T.I.: AirAuth: a biometric authentication system using in-air hand gestures. CHI '14 Extended Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada (2014)

210. Krause, M.: A behavioral biometrics based authentication method for MOOC's that is robust against imitation attempts. Proceedings of the first ACM conference on Learning @ scale conference. ACM, Atlanta, Georgia, USA (2014)

211. Kuber, R., Sharma, S.: Toward tactile authentication for blind users. Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility. ACM, Orlando, Florida, USA (2010)

212. Kuber, R., Yu, W.: Feasibility study of tactile-based authentication. International Journal of Human-Computer Studies 68, 158-181 (2010)

213. Kulkarni, S., Raut, R.D., Dakhole, P.K.: A Novel Authentication System Based on Hidden Biometric Trait. Procedia Computer Science 85, 255-262 (2016)

214. Kulkarni, S., Raut, R.D., Dakhole, P.K.: Wavelet Based Modern Finger Knuckle Authentication. Procedia Computer Science 70, 649-657 (2015)

215. Kumar, A., Garg, S., Hanmandlu, M.: Biometric authentication using finger nail plates. Expert Systems with Applications 41, 373-386 (2014)

216. Kumar, A., Zhang, D.: Integrating palmprint with face for user authentication. In: Workshop on Multimodal User Authentication (MMUA 2003), pp. 107-112. Citeseer, (2003)

217. Kumar, A., Zhang, D.: Personal recognition using hand shape and texture. IEEE Transactions on Image Processing 15, 2454-2461 (2006)

218. Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 597-600 (2004)

219. Kumar, N., Kaur, K., Misra, S.C., Iqbal, R.: An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications 1-17 (2015)

220. Kumar, T.R., Raghavan, S.: PassPattern System (PPS): a pattern-based user authentication scheme. In: International Conference on Research in Networking, pp. 162-169. Springer, (2008)

221. Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Networking and Applications 1-14 (2015)

222. Kumari, S., Gupta, M.K., Kumar, M.: Cryptanalysis and security enhancement of Chen et al.’s remote user authentication scheme using smart card. Central European Journal of Computer Science 2, 60-75 (2012)

223. Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart card. International Journal of Communication Systems 29, 441-458 (2016)

224. Kumari, S., Om, H.: A modified remote authentication method with smartcards and check digits. In: Proceedings - 2014 International Conference on Data Science and Engineering, ICDSE 2014, pp. 206-209. (2014)

225. Kuribara, T., Shizuki, B., Tanaka, J.: Vibrainput: two-step PIN entry system based on vibration and visual information. CHI '14 Extended Abstracts on Human Factors in Computing Systems. ACM, Toronto, Ontario, Canada (2014)

226. Kwon, T., Hong, J.: Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. IEEE Transactions on Information Forensics and Security 10, 278-292 (2015)

227. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770-772 (1981)

228. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53, 1683-1687 (2006)

229. Lee, C.-C., Hwang, M.-S., Yang, W.-P.: A flexible remote user authentication scheme using smart cards. SIGOPS Oper. Syst. Rev. 36, 46-52 (2002)

230. Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user authentication scheme using hash functions. SIGOPS Oper. Syst. Rev. 36, 23-29 (2002)

231. Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications 38, 13863-13870 (2011)

232. Lee, C.-Y., Lin, C.-H., Chang, C.-C.: An improved low computation cost user authentication scheme for mobile communication. In: 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp. 249-252. IEEE, (2005)

233. Lee, G., Jun-bin, C.A.O., Haitao, Y., Lili, D.: International Conference on Solid State Devices and Materials Science, April 1-2, 2012, MacaoEyebrows Identity Authentication Based on Wavelet Transform and Support Vector Machines. Physics Procedia 25, 1337-1341 (2012)

234. Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme for site authentication. In: Lecture Notes in Computer Science, pp. 111-116. (2005)

235. Lee, J., Park, H., Bang, G., Song, J.: POSTER: A Password-based Authentication by Splitting Roles of User Interface. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, Denver, Colorado, USA (2015)

236. Lee, N.Y., Chiu, Y.C.: Improved remote authentication scheme with smart card. Computer Standards and Interfaces 27, 177-180 (2005)

237. Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Symposium on cryptography and information security. (2006)

238. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Improved efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50, 565-567 (2004)

239. Lee, T.-F.: An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems. Journal of Medical Systems 37, 1-9 (2013)

240. Lee, Y., Chung, Y., Moon, K.: Secure face authentication framework in open networks. ETRI Journal 32, 950-960 (2010)

241. Lee, Y., Kim, J., Jeon, W., Won, D.: Design of a simple user authentication scheme using QR-code for mobile device. Information Technology Convergence, Secure and Trust Computing, and Data Management, pp. 241-247. Springer (2012)

242. Lee, Y.S., Kim, E., Jung, M.S.: A smart card based user authentication scheme for multi-server environment. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. (2011)

243. Leea, W.B., Chen, T.H., Sun, W.R., Ho, K.I.J.: An S/Key-like one-time password authentication scheme using smart cards for smart meter. In: Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014, pp. 281-286. (2014)

244. Leftheriotis, I.: User authentication in a multi-touch surface: a chord password system. CHI '13 Extended Abstracts on Human Factors in Computing Systems. ACM, Paris, France (2013)

245. Leicher, A., Schmidt, A.U., Shah, Y.: Smart OpenID: a smart card based OpenID protocol. In: IFIP International Information Security Conference, pp. 75-86. Springer, (2012)

246. León-Coca, J.M., Reina, D.G., Toral, S.L., Barrero, F., Bessis, N.: Authentication Systems Using ID Cards over NFC Links: The Spanish Experience Using DNIe. Procedia Computer Science 21, 91-98 (2013)

247. Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 55, 35-44 (2012)

248. Li, D., Sang, L., Yang, Y., Wu, Z.: Bimodal speaker identification using dynamic bayesian network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3338, pp. 577-585 (2004)

249. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security 13, 229-244 (2014)

250. Li, F., Wechsler, H.: Face authentication using recognition-by-parts, boosting and transduction. International Journal of Pattern Recognition and Artificial Intelligence 23, 545-573 (2009)

251. Li, L., Zhao, X., Xue, G.: Unobservable Re-authentication for Smartphones. In: NDSS. (2013)

252. Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Transactions on Neural Networks 12, 1498-1504 (2001)

253. Li, X., Liao, J., Kumari, S., Liang, W., Wu, F., Khan, M.K.: A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design. Wireless Personal Communications 85, 263-288 (2015)

254. Li, X., Niu, J., Khan, M.K., Liao, J.: Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards. In: Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, pp. 149-154. (2013)

255. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W.: An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications 80, 175-192 (2015)

256. Li, X., Niu, J., Liu, Y., Liao, J., Liang, W.: Robust dynamic ID-based remote user authentication scheme using smart cards. International Journal of Ad Hoc and Ubiquitous Computing 17, 254-264 (2014)

257. Li, X., Wang, K., Shen, J., Kumari, S., Wu, F., Hu, Y.: An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing 7, 427-443 (2016)

258. Li, X., Wen, Q., Li, W., Zhang, H., Jin, Z.: Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. Journal of medical systems 38, 1-8 (2014)

259. Li, X., Wen, Q., Zhang, H., Jin, Z.: An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management 23, 311-324 (2013)

260. Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: A secure image-based authentication scheme for mobile devices. In: Lecture Notes in Computer Science, pp. 751-760. (2005)

261. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. Journal of Computer and System Sciences 72, 727-740 (2006)

262. Liao, Y.-P., Hsiao, C.-M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks 18, 133-146 (2014)

263. Liao, Y.P., Hsiao, C.M.: A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols. Smart Innovation, Systems and Technologies, vol. 21, pp. 1-13 (2013)

264. Liaw, H.-T., Fan, S.-W., Wu, W.-C.: A simple password authentication using a polynomial. SIGOPS Oper. Syst. Rev. 38, 74-79 (2004)

265. Lin, C.-L., Hwang, T.: A password authentication scheme with secure password updating. Computers & Security 22, 68-72 (2003)

266. Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new strong-password authentication scheme using one-way hash functions. Journal of Computer and Systems Sciences International 45, 623-626 (2006)

267. Lin, I.-C., Chang, C.-C.: A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Information Sciences 179, 1269-1277 (2009)

268. Lin, M.-H., Chang, C.-C.: A secure one-time password authentication scheme with low-computation for mobile communications. SIGOPS Oper. Syst. Rev. 38, 76-84 (2004)

269. Lin, T.H., Shih, W.P., Chen, W.C., Ho, W.Y.: 3D face authentication by mutual coupled 3D and 2D feature extraction. Proceedings of the 44th annual Southeast regional conference. ACM, Melbourne, Florida (2006)

270. Liou, J.C., Conway, J.: A single-factor dynamic authentication for computer systems with touch screens. In: 23rd International Conference on Software Engineering and Data Engineering, SEDE 2014, pp. 31-36. (2014)

271. Liu, J., Yu, F.R., Lung, C.H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications 8, 806-815 (2009)

272. Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a single tri-axis accelerometer. Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, Bonn, Germany (2009)

273. Liu, J.Y., Zhou, A.M., Gao, M.X.: A new mutual authentication scheme based on nonce and smart cards. Computer Communications 31, 2205-2209 (2008)

274. Lo, N., Tsai, J.: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings. IEEE Transactions on Intelligent Transportation Systems (2015)

275. Lo, N.-W., Yeh, K.-H.: An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system. In: International Conference on Embedded and Ubiquitous Computing, pp. 43-56. Springer, (2007)

276. Lo, N.W., Yeh, K.H.: Mutual RFID authentication scheme for resource-constrained tags. Journal of Information Science and Engineering 26, 1875-1889 (2010)

277. Lopez, N., Rodriguez, M., Fellegi, C., Long, D., Schwarz, T.: Even or Odd: A Simple Graphical Authentication System. IEEE Latin America Transactions 13, 804-809 (2015)

278. Loutrel, M., Urien, P., Gaïti, D.: Authentication in wireless networks: state of the art and integration with smart card. Annales des Télécommunications 59, 130-148 (2004)

279. Lu, Y., Wu, X., Yang, X.: A secure anonymous authentication scheme for wireless communications using smart cards. International Journal of Network Security 17, 237-245 (2015)

280. Luca, A.D., Harbach, M., Zezschwitz, E.v., Maurer, M.-E., Slawik, B.E., Hussmann, H., Smith, M.: Now you see me, now you don't: protecting smartphone authentication from shoulder surfers. Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, Toronto, Ontario, Canada (2014)

281. Luca, A.D., Weiss, R., Hu, H., mann, An, X.: Eyepass - eye-stroke authentication for public terminals. CHI '08 Extended Abstracts on Human Factors in Computing Systems. ACM, Florence, Italy (2008)

282. Luca, A.D., Zezschwitz, E.v., Hu, H., mann: Vibrapass: secure authentication based on shared lies. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Boston, MA, USA (2009)

283. Luca, A.D., Zezschwitz, E.v., Nguyen, N.D.H., Maurer, M.-E., Rubegni, E., Scipioni, M.P., Langheinrich, M.: Back-of-device authentication on smartphones. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Paris, France (2013)

284. Lumini, A., Nanni, L.: An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers. Neurocomputing 69, 1706-1710 (2006)

285. Maio, D., Nanni, L.: Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004. Neurocomputing 69, 242-249 (2005)

286. Maiorana, E., Campisi, P., Gonz, N., lez, C., Neri, A.: Keystroke dynamics authentication for mobile phones. Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, TaiChung, Taiwan (2011)

287. Malempati, S., Mogalla, S.: Intrusion prevention by native language password authentication scheme. Communications in Computer and Information Science, vol. 196 CCIS, pp. 239-248 (2011)

288. Manasa, N.L., Govardhan, A., Satyanarayana, C.H.: Fusion of multiple biometric traits: Fingerprint, palmprint and iris. Intelligent Systems Reference Library, vol. 70, pp. 287-320 (2014)

289. Mandalapu, A., Daffney Deepa, V., Raj, L.D., Anish Dev, J.: An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies. In: Computing and Communication (IEMCON), 2015 International Conference and Workshop on, pp. 1-6. (2015)

290. Maqsood, S., Chiasson, S., Girouard, A.: POSTER: Passwords on flexible display devices. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, Berlin, Germany (2013)

291. Marcel, S., Millán, J.d.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 743-752 (2007)

292. Martínez-Peláez, R., Rico-Novella, F., Forné, J., Velarde-Alvarado, P.: Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh. Journal of Applied Research and Technology 11, 755-763 (2013)

293. Matsuyama, Y., Shozawa, M., Yokote, R.: Brain signal׳s low-frequency fits the continuous authentication. Neurocomputing 164, 137-143 (2015)

294. Medikonda, J., Madasu, H., B.K, P.: Information set based gait authentication system. Neurocomputing

295. Meng, Y., Wong, D.S., Kwok, L.-F.: Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. Proceedings of the 29th Annual ACM Symposium on Applied Computing. ACM, Gyeongju, Republic of Korea (2014)

296. Meng, Y., Wong, D.S., Schlegel, R.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: International Conference on Information Security and Cryptology, pp. 331-350. Springer, (2012)

297. Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings - 2012 IEEE 7th International Conference on Networking, Architecture and Storage, NAS 2012, pp. 39-48. (2012)

298. Mihajlov, M., Jerman-Blažič, B.: On designing usable and secure recognition-based graphical authentication mechanisms. Interacting with Computers 23, 582-593 (2011)

299. Mir, O., Munilla, J., Kumari, S.: Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Networking and Applications 1-13 (2015)

300. Mir, O., Nikooghadam, M.: A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services. Wireless Personal Communications 83, 2439-2461 (2015)

301. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 9, 171-192 (2016)

302. Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K.: Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems 38, 1-12 (2014)

303. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A.: Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems 38, 1-11 (2014)

304. Mishra, D.: Design and Analysis of a Provably Secure Multi-server Authentication Scheme. Wireless Personal Communications 86, 1095-1119 (2016)

305. Mishra, R., Barnwal, A.K.: A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems 39, 1-10 (2015)

306. Mock, K., Hoanca, B., Weaver, J., Milton, M.: Real-time continuous iris recognition for authentication using an eye tracker. Proceedings of the 2012 ACM conference on Computer and communications security. ACM, Raleigh, North Carolina, USA (2012)

307. Mock, P., Edelmann, r., Schilling, A., Rosenstiel, W.: User identification using raw sensor data from typing on interactive displays. Proceedings of the 19th international conference on Intelligent User Interfaces. ACM, Haifa, Israel (2014)

308. Mondal, A., Roy, K., Bhattacharya, P.: Secure and simplified access to home appliances using Iris recognition. In: Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009. CIB 2009. IEEE Workshop on, pp. 22-29. (2009)

309. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM conference on Computer and communications security, pp. 48-56. ACM, (1997)

310. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Generation computer systems 16, 351-359 (2000)

311. Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems. Procedia Computer Science 32, 198-206 (2014)

312. Mudholkar, S.S., Shende, P.M., Sarode, M.V.: Biometrics authentication technique for intrusion detection systems using fingerprint recognition. International Journal of Computer Science, Engineering and Information Technology 2, 57-65 (2012)

313. Nader, J., Alsadoon, A., Prasad, P.W.C., Singh, A.K., Elchouemi, A.: Designing Touch-Based Hybrid Authentication Method for Smartphones. Procedia Computer Science 70, 198-204 (2015)

314. Nakakuni, M., Dozono, H., Tokushima, H., Noguchi, Y.: Application of self organizing maps for the integrated authentication using keystroke timings and handwritten symbols. WSEAS Transactions on Information Science and Applications 4, 413-420 (2007)

315. Nam, J., Choo, K.K.R., Paik, J.: A provably-anonymous authentication scheme for roaming services. International Journal of Security and its Applications 10, 193-204 (2016)

316. Nam, J., Kim, M., Paik, J., Lee, Y., Won, D.: A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14, 21023-21044 (2014)

317. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, 299-302 (2007)

318. Nanni, L., Lumini, A.: Human authentication featuring signatures and tokenised random numbers. Neurocomputing 69, 858-861 (2006)

319. Nanni, L., Lumini, A.: Random subspace for an improved BioHashing for face authentication. Pattern Recognition Letters 29, 295-300 (2008)

320. Nayak, A., Bansode, R.: Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points. Procedia Computer Science 79, 553-560 (2016)

321. Nguyen, C.X., Huang, H.-H., Kawagoe, K.: POSTER: Graphical password using object-based image ranking. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, Berlin, Germany (2013)

322. Nguyen, T.A.T., Dang, T.K.: Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol. In: 2015 International Conference on Advanced Computing and Applications (ACOMP), pp. 1-6. (2015)

323. Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., Olivier, P.: A security assessment of tiles: a new portfolio-based graphical authentication system. CHI '12 Extended Abstracts on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012)

324. Nigam, A., Gupta, P.: Designing an accurate hand biometric based authentication system fusing finger knuckleprint and palmprint. Neurocomputing 151, 1120-1132 (2015)

325. Nigam, A., Tiwari, K., Gupta, P.: Multiple texture information fusion for finger-knuckle-print authentication system. Neurocomputing 188, 190-205 (2016)

326. Niinuma, K., Jain, A.K.: Continuous user authentication using temporal information. In: SPIE Defense, Security, and Sensing, pp. 76670L-76670L-76611. International Society for Optics and Photonics, (2010)

327. Niinuma, K., Park, U., Jain, A.K.: Soft Biometric Traits for Continuous User Authentication. IEEE Transactions on Information Forensics and Security 5, 771-780 (2010)

328. Nikolić, D., Vuksanović, B., Nguyen, C.: Attribute selection and intrusion detection for knowledge-based authentication systems. In: Proceedings of the 12th IASTED International Conference on Artificial Intelligence and Soft Computing, ASC 2008, pp. 202-207. (2008)

329. Nosseir, A., Connor, R., Renaud, K.: Question-based group authentication. Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments. ACM, Sydney, Australia (2006)

330. Ntalianis, K., Tsapatsoulis, N., Drigas, A.: Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions. EURASIP Journal on Information Security 2011, 1-12 (2011)

331. Odelu, V., Das, A.K., Goswami, A.: An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems. Wireless Personal Communications 84, 2571-2598 (2015)

332. O'Gorman, L., Bagga, A., Bentley, J.: Query-directed passwords. Computers & Security 24, 546-560 (2005)

333. O'Gorman, L., Sammon, M.J., Bentley, J., Skiba, D.J., Erhart, G.W.: Options for spoken human-computer authentication in mobile environments. In: Proceedings of the 3rd IASTED International Conference on Human-Computer Interaction, HCI 2008, pp. 230-235. (2008)

334. Onali, T., Ginesu, G.: Transmission-efficient image-based authentication for mobile devices. In: International Workshop on Visual Content Processing and Representation, pp. 22-28. Springer, (2005)

335. Ota, H., Aoyama, S., Watanabe, R., Ito, K., Miyake, Y., Aoki, T.: Implementation and evaluation of a remote authentication system using touchless palmprint recognition. Multimedia Systems 19, 117-129 (2013)

336. Ouda, O., Tsumura, N., Nakaguchi, T.: BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes. IEICE Transactions on Information and Systems E93-D, 1878-1888 (2010)

337. Ouda, O., Tsumura, N., Nakaguchi, T.: Tokenless cancelable biometrics scheme for protecting iriscodes. In: Proceedings - International Conference on Pattern Recognition, pp. 882-885. (2010)

338. Ouyang, H., Lee, T.: A new lip feature representation method for video-based bimodal authentication. Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop - Volume 57. Australian Computer Society, Inc., Sydney, Australia (2006)

339. Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems 18, 59-66 (2008)

340. Park, M., Kita, Y., Aburada, K., Okazaki, N.: Proposal of a puzzle authentication method with shoulder-surfing attack resistance. In: Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS 2014, pp. 495-500. (2014)

341. Part, Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7335 LNCS, pp. 391-406 (2012)

342. Part, Kim, J., Jim, S.: Authentication and key agreement method for home networks using a smart card. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4705 LNCS, pp. 655-665 (2007)

343. Part, Yoo, S., Yoo, J., Park, P., Ryou, J.: A lightweight and stable authentication method for the internet access control in smartphones. Communications in Computer and Information Science, vol. 251 CCIS, pp. 331-342 (2011)

344. Patel, A., Kalajdzic, K., Golafshan, L., Taghavi, M.: Design and implementation of a zero-knowledge authentication framework for Java Card. International Journal of Information Security and Privacy 5, 1-18 (2011)

345. Pathan, A.-S.K., Hong, C.S.: Bilinear-pairing-based remote user authentication schemes using smart cards. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM, Suwon, Korea (2009)

346. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., van der Lubbe, J.C.A.: Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence 24, 1061-1069 (2011)

347. Peris-Lopez, P., Lim, T.-L., Li, T.: Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework. In: International Conference on Embedded and Ubiquitous Computing, 2008. EUC'08. IEEE/IFIP, pp. 159-166. IEEE, (2008)

348. Phan, D.T., Truong, T.T., Tran, M.T., Duong, A.D.: Two-way biometrics-based authentication scheme on mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8860, pp. 177-190 (2014)

349. Phua, K., Chen, J., Dat, T.H., Shue, L.: Heart sound as a biometric. Pattern Recognition 41, 906-919 (2008)

350. Pintor Maestre, D.: QRP: An improved secure authentication method using QR codes. (2012)

351. Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Robust Smart Card Authentication Scheme for Multi-server Architecture. Wireless Personal Communications 72, 729-745 (2013)

352. Pishva, D.: Spectroscopic Approach for Aliveness Detection in Biometrics Authentication. In: 2007 41st Annual IEEE International Carnahan Conference on Security Technology, pp. 133-137. IEEE, (2007)

353. Podilchuk, C., Barinov, L., Hulbert, W., Jairaj, A.: Face recognition in a tactical environment. In: MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pp. 900-905. (2010)

354. Preuveneers, D., Joosen, W.: SmartAuth: dynamic context fingerprinting for continuous user authentication. Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, Salamanca, Spain (2015)

355. Qi, M., Lu, Y., Li, J., Li, X., Kong, J.: User-specific iris authentication based on feature selection. In: Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008, pp. 1040-1043. (2008)

356. Qiao, M., Zhang, S., Sung, A.H., Liu, Q.: A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics. In: Proceedings - International Computer Software and Applications Conference, pp. 494-503. (2015)

357. Rajasekaran, M.P., Suresh, M., Dhanasekaran, U.: Multimodal biometric recognition using sclera and fingerprint based on ANFIS. In: 2014 International Conference on Recent Trends in Information Technology, ICRTIT 2014. (2014)

358. Ramanathan, V., Wechsler, H.: Robust human authentication using appearance and holistic anthropometric features. Pattern Recognition Letters 31, 2425-2435 (2010)

359. Ranjan, P., Om, H.: An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem. Wireless Personal Communications 1-28 (2016)

360. Rathgeb, C., Uhl, A.: Secure iris recognition based on local intensity variations. In: International Conference Image Analysis and Recognition, pp. 266-275. Springer, (2010)

361. Ray, P.P.: Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices. International journal of computer trends and technology 3, 235-241 (2012)

362. Renaud, K.: A visuo-biometric authentication mechanism for older users. People and Computers XIX—The Bigger Picture, pp. 167-182. Springer (2006)

363. Revett, K.: A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of Control, Automation and Systems 7, 7-15 (2009)

364. Ribeiro, M.A.C., Scharcanski, J., Schuck, A.: An user identity authentication scheme adaptive to changes in face appearance. In: Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE, pp. 1-5. (2011)

365. Ritter, D., Schaub, F., Walch, M., Weber, M.: MIBA: multitouch image-based authentication on smartphones. CHI '13 Extended Abstracts on Human Factors in Computing Systems. ACM, Paris, France (2013)

366. Rohith, G., Bhuvaneswari, M., Kannaki, S.: Optimization of dynamic resistance against malicious attacks & collusion through enhanced authentication schemes in application to smartcard. In: 2015 IEEE 7th National Conference on Computing, Communication and Information Systems, NCCCIS 2015, pp. 5-10. (2015)

367. Roth, V., Schmidt, P., G, B., ldenring: The IR ring: authenticating users' touches on a multi-touch display. Proceedings of the 23nd annual ACM symposium on User interface software and technology. ACM, New York, New York, USA (2010)

368. Ryu, E.-K., Kim, D.-S., Yoo, K.-Y.: On Elliptic Curve Based Untraceable RFID Authentication Protocols. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, Portland, Oregon, USA (2015)

369. Sadqi, Y., Asimi, A., Asimi, Y.: A Cryptographic Mutual Authentication Scheme for Web Applications. arXiv preprint arXiv:1412.2908 (2014)

370. Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, Texas, USA (2012)

371. Sae-Bae, N., Jakobsson, M.: Hand authentication on multi-touch tablets. Proceedings of the 15th Workshop on Mobile Computing Systems and Applications. ACM, Santa Barbara, California (2014)

372. Saevanee, H., Clarke, N., Furnell, S., Biscione, V.: Continuous user authentication using multi-modal biometrics. Computers & Security 53, 234-246 (2015)

373. Safie, S.I., Soraghan, J.J., Petropoulakis, L.: Electrocardiogram (ECG) biometric authentication using pulse active ratio (PAR). IEEE Transactions on Information Forensics and Security 6, 1315-1322 (2011)

374. Sagar, K., Waghmare, V.: “Measuring the Security and Reliability of Authentication of Social Networking Sites”. Procedia Computer Science 79, 668-674 (2016)

375. Sakata, K., Maeda, T., Matsushita, M., Sasakawa, K., Tamaki, H.: Fingerprint authentication based on matching scores with other data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3832 LNCS, pp. 280-286 (2006)

376. Samangouei, P., Patel, V.M., Chellappa, R.: Facial Attributes for Active Authentication on Mobile Devices. Image and Vision Computing (2016)

377. Sandirigama, M., Shimizu, A.: Simple and secure password authentication protocol (SAS). IEICE Transactions on Communications 83, 1363-1365 (2000)

378. Sarier, N.D.: A new approach for biometric template storage and remote authentication. In: International Conference on Biometrics, pp. 909-918. Springer, (2009)

379. Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem. Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, Kochi, India (2015)

380. Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Florence, Italy (2008)

381. Sathish Babu, B., Venkataram, P.: Transaction based authentication scheme for mobile communication: A cognitive agent based approach. In: Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS 2007; Abstracts and CD-ROM. (2007)

382. Schneegass, S., Oualil, Y., Bulling, A.: SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, Santa Clara, California, USA (2016)

383. Shanmugapriya, D., Padmavathi, G.: A wrapper based feature subset selection using ACO-ELM-ANP and GA-ELM-ANP approaches for keystroke dynamics authentication. In: International Conference on Signal Processing, Image Processing and Pattern Recognition 2013, ICSIPR 2013. (2013)

384. Shen, H., Gao, C., He, D., Wu, L.: New biometrics-based authentication scheme for multi-server environment in critical systems. Journal of Ambient Intelligence and Humanized Computing 6, 825-834 (2015)

385. Shen, J.-J., Lin, C.-W., Hwang, M.-S.: A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 49, 414-416 (2003)

386. Shen, Z.-h.: A new modified remote user authentication scheme using smart cards. Applied Mathematics-A Journal of Chinese Universities 23, 371-376 (2008)

387. Sheng, Y., Phoha, V.V., Rovnyak, S.M.: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35, 826-833 (2005)

388. Shi, P., Zhu, B., Youssef, A.: A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 237-241. (2009)

389. Shi, W.-M., Yang, Y.-G., Zhou, Y.-H.: Quantum signature-masked authentication schemes. Optik - International Journal for Light and Electron Optics 126, 3544-3548 (2015)

390. Shieh, W.G., Wang, M.T.: Improvement of chen et al.’s fingerprint biometric remote authentication scheme. ICIC Express Letters 9, 1571-1575 (2015)

391. Shimizu, A., Horioka, T., Inagaki, H.: A password authentication method for contents communications on the Internet. IEICE transactions on communications 81, 1666-1673 (1998)

392. Shimizu, A.: A dynamic password authentication method using a one‐way function. Systems and computers in Japan 22, 32-40 (1991)

393. Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: A smarter geolocation-based authentication scheme. Security and Communication Networks 8, 3927-3938 (2015)

394. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on, pp. 1-6. (2015)

395. Shuren, L., Qiuyan, Z., Chao, C., Yiqi, D.: A unidirectional one-time password authentication scheme without counter desynchronization. In: 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, pp. 361-364. (2009)

396. Singh, Y.N., Singh, S.K., Gupta, P.: Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system. Pattern Recognition Letters 33, 1932-1941 (2012)

397. Sodhi, B.: Using dropped call as an authentication factor. In: Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, pp. 2031-2035. (2015)

398. Somayaji, A., Mould, D., Brown, C.: Towards narrative authentication: or, against boring authentication. Proceedings of the 2013 workshop on New security paradigms workshop. ACM, Banff, Alberta, Canada (2013)

399. Sreeja, C.S., Misbahuddin, M.: A secure image-based authentication scheme employing DNA crypto and steganography. In: ACM International Conference Proceeding Series, pp. 595-601. (2015)

400. Sreeramareddy, L., Miao, S., Feng, J.H.: Investigating gesture-based password: usability and vulnerability to shoulder-surfing attacks. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems. ACM, Towson, Maryland (2014)

401. Srinivasa, K.G., Gosukonda, S.: Continuous multimodal user authentication: coupling hard and soft biometrics with support vector machines to attenuate noise. CSI Transactions on ICT 2, 129-140 (2014)

402. Sriram, J.C., Shin, M., Choudhury, T., Kotz, D.: Activity-aware ECG-based patient authentication for remote health monitoring. Proceedings of the 2009 international conference on Multimodal interfaces. ACM, Cambridge, Massachusetts, USA (2009)

403. Srisuk, S., Petrou, M., Kurutach, W., Kadyrov, A.: A face authentication system using the trace transform. Pattern Analysis and Applications 8, 50-61 (2005)

404. Starnberger, G., Froihofer, L., Goeschka, K.M.: QR-TAN: Secure mobile transaction authentication. In: International Conference on Availability, Reliability and Security, 2009. ARES'09., pp. 578-583. IEEE, (2009)

405. Sun, H.-M.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 958-961 (2000)

406. Suoranta, S., Andrade, A., Aura, T.: Strong authentication with mobile phone. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7483 LNCS, pp. 70-85 (2012)

407. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. Proceedings of the 7th workshop on Multimedia and security. ACM, New York, NY, USA (2005)

408. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations in feature vector structure in keystroke dynamics authentication systems. Software Quality Journal 24, 137-157 (2016)

409. Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. In: International Conference on Mobile Human-Computer Interaction, pp. 347-351. Springer, (2003)

410. Takada, T., Kokubun, Y.: Extended PIN authentication scheme allowing multi-touch key input. In: ACM International Conference Proceeding Series, pp. 307-310. (2013)

411. Takada, T.: FakePointer: An authentication scheme for improving security against peeping attacks using video cameras. In: Proceedings - The 2nd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008, pp. 395-400. (2008)

412. Tamrakar, S., Ekberg, J.-E., Asokan, N.: Identity verification schemes for public transport ticketing with NFC phones. Proceedings of the sixth ACM workshop on Scalable trusted computing. ACM, Chicago, Illinois, USA (2011)

413. Tan, Z.: Analysis and improvement of a user authentication improved protocol. Journal of Networks 5, 622-630 (2010)

414. Tan, Z.: Improvement on a password authentication scheme for multi-server environments. Journal of Convergence Information Technology 6, 218-228 (2011)

415. Tang, Y., Hidenori, N., Urano, Y.: User authentication on smart phones using a data mining method. In: 2010 International Conference on Information Society, i-Society 2010, pp. 173-178. (2010)

416. Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: A multiple layer fusion approach on keystroke dynamics. Pattern Analysis and Applications 14, 23-36 (2011)

417. Thiranant, N., Lee, H.: A Design of e-Healthcare Authentication Framework with QR Code. International Journal of Security and Its Applications 8, 79-86 (2014)

418. Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of GeoPass: a geographic location-password scheme. Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, Newcastle, United Kingdom (2013)

419. Thorpe, J., Oorschot, P.C.v., Somayaji, A.: Pass-thoughts: authenticating with our minds. Proceedings of the 2005 workshop on New security paradigms. ACM, Lake Arrowhead, California (2005)

420. Topkara, U., Atallah, M.J., Topkara, M.: Passwords decay, words endure: secure and re-usable multiple password mnemonics. Proceedings of the 2007 ACM symposium on Applied computing. ACM, Seoul, Korea (2007)

421. Traore, I., Woungang, I., Obaidat, M.S., Nakkabi, Y., Lai, I.: Online risk-based authentication using behavioral biometrics. Multimedia Tools and Applications 71, 575-605 (2014)

422. Trojahn, M., Ortmeier, F.: Biometric authentication through a virtual keyboard for smartphones. International Journal of Computer Science & Information Technology 4, 1 (2012)

423. Truong, T.T., Tran, M.T., Duong, A.D.: Modified efficient and secure dynamic ID-based user authentication scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7804 LNCS, pp. 409-415 (2013)

424. Tsai, J.-L., Lo, N.-W., Wu, T.-C.: A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks. Wireless Personal Communications 71, 1977-1988 (2013)

425. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security 27, 115-121 (2008)

426. Tsalakanidou, F., Malassiotis, S., Strintzis, M.G.: Exploitation of 3D images for face authentication under pose and illumination variations. In: 3D Data Processing, Visualization and Transmission, 2004. 3DPVT 2004. Proceedings. 2nd International Symposium on, pp. 50-57. (2004)

427. Tseng, Y.-M., Wu, T.-Y., Wu, J.-D.: A pairing-based user authentication scheme for wireless clients with smart cards. Informatica 19, 285-302 (2008)

428. Tsuchiya, T., Kihara, M., Berena, A.J.P.: Transmission time-based authentication scheme using 3G mobile device for DRM system. In: 2009 IEEE International Frequency Control Symposium Joint with the 22nd European Frequency and Time Forum, pp. 706-710. (2009)

429. Tullis, T.S., Tedesco, D.P.: Using personal photos as pictorial passwords. CHI '05 Extended Abstracts on Human Factors in Computing Systems. ACM, Portland, OR, USA (2005)

430. Umar, M.S., Rafiq, M.Q.: Select-to-Spawn: A novel recognition-based graphical user authentication scheme. In: 2012 IEEE International Conference on Signal Processing, Computing an