1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
2. Stanislav, M.: Two-factor authentication (2015)
3. Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: USENIX Security, pp. 301–316 (2012)
4. Lecture Notes in Computer Science;GD Abowd,1999
5. Groopman, J.: Consumer perceptions of privacy in the internet of things. Altimeter Group (2015)