1. Personal distance - divided by zones. http://www.study-body-language.com/Personal-distance.html (2016)
2. Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 641–644. IEEE (2009)
3. AlZomai, M., AlFayyadh, B., Jøsang, A., McCullagh, A.: An exprimental investigation of the usability of transaction authorization in online bank security systems. In: Proceedings of the Sixth Australasian Conference on Information Security, vol. 81, pp. 65–73. Australian Computer Society, Inc. (2008)
4. Czeskis, A., Dietz, M., Kohno, T., Wallach, D., Balfanz, D.: Strengthening user authentication through opportunistic cryptographic identity assertions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 404–414. ACM (2012)
5. Davi, L., Dmitrienko, A., Liebchen, C., Sadeghi, A.R.: Over-the-air cross-platform infection for breaking mTAN-based online banking authentication. Black Hat Abu Dhabi, pp. 1–12 (2012)