1. Sottek, T.C., Kopfstein, J.: Everything you need to know about PRISM.
https://www.theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet
. Accessed 17 July 2013
2. Tamimi, A.A., Al-Allaf, O.N.A., Alia, M.A.: Cryptography based authentication methods. In: Proceedings of the World Congress on Engineering and Computer Science, pp. 199–204 (2014)
3. Shah, N.: Google official blog.
https://googleblog.blogspot.co.nz/2011/02/advanced-sign-in-security-for-your.html
. Accessed 7 Dec 2011
4. Fiat, A., Shamir, A., Feige, U.: Zero-knowledge proofs of identity. J. Cryptol. 1, 77–94 (1988)
5. Christie, S.: FRIDAY AFTERNOON FRAUD How hackers can pose as your email contacts to take your cash… and the banks will NOT refund you. The Sun.
https://www.thesun.co.uk/living/2699976/how-criminals-can-hack-into-emails-and-trick-you-into-transferring-cash-and-banks-have-no-way-to-stop-it/
. Accessed 25 Jan 2017