1. Walker, K.: The treacherous twelve’ cloud computing top threats. In: RSA Conference Booth #S2614, SAN FRANCISCO, Cloud Security Alliance, 29 Feb 2016
2. Multi-Factors Authentication, From Wikipedia, the free encyclopaedia. https://en.wikipedia.org/wiki/Multi-factor_authentication
3. Gujar, G.V., Sapkal, S., Korade, M.V.: STEP-2 user authentication for cloud computing. Int. J. Eng. Innov. Technol. (IJEIT) 2(10), ISSN: 2277-3754 ISO 9001:2008 Certified Apr 2013
4. Soni, P., Sahoo, M.: Multi-factor authentication security framework in cloud computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. (IJARCSSE) 5(1), 1065–1071 (2015). ISSN: 2277 128X
5. Nagaraju, S., Parthiban, L.: SecAuthn: provably secure multi-factor authentication for the cloud computing systems. Ind. J. Sci. Technol. (IJST) 9(9) (2016). ISSN (Online): 0974-5645