1. Nasir, A., Arshah, R.A.: Information security culture dimensions in information security policy compliance study: a review. Adv. Sci. Lett. 24(2), 943–946 (2018)
2. Lind, J., Eyal, I., Kelbert, F., et al.: Teechain: scalable blockchain payments using trusted execution environments (2017). arXiv preprint
arXiv:1707.05454
3. Ren-Ji, H., Xiao-Ping, W.U., Hong-Cheng, L.I.: Identity authentication scheme based on identity-based encryption. Chin. J. Netw. Inf. Secur. 2(6), 32–37 (2016)
4. Zhang, L., Ning, H.Y., Du, Y.Y., et al.: A new identity authentication scheme of single sign on for multi-database. In: IEEE International Conference on Software Engineering and Service Science. IEEE (2017)
5. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)