1. Wikipedia, Authentication.
https://en.wikipedia.org/wiki/Authentication
2. Lee, C.-C., Li, L.-H., Hwang, M.-S.: A remote user authentication scheme using hash functions. ACM SIGOPS Oper. Syst. Rev. 36(4), 23–29 (2002)
3. Wikipedia, Personal identification number.
https://en.wikipedia.org/wiki/Personal_identification_number
4. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4), 727–740 (2006)
5. Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the ACSA (Annual Computer Security Applications Conference), pp. 463–472, December 2005