1. N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing: a survey. IEEE Internet Things J. 5(1), 450–465 (2018)
2. S.J. Aboud, Secure password authentication system using smart card. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 3(1), 75–79 (2014)
3. N. Adhikary, R. Shrivastava, A. Kumar, S.K. Verma, M. Bag, V. Singh, Battering keyloggers and screen recording software by fabricating passwords. Int. J. Comput. Netw. Inf. Secur. 4(5), 13 (2012)
4. M. Alzomai, A. Jøsang, The mobile phone as a multi OTP device using trusted computing, in 2010 Fourth International Conference on Network and System Security (IEEE, 2010, September), pp. 75–82
5. P. Ambalakat, Security of biometric authentication systems, in 21st Computer Science Seminar (2005, April), p. 1