1. Kainda, R., Flechais, I., Roscoe, A.: Security and usability: analysis and evaluation. In: International Conference on Availability, Reliability, and Security, 2010. ARES’10, pp. 275–282 IEEE (2010)
2. Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K.: In search of usable security: five lessons from the field. IEEE Secur. Priv. 5, 19–24 (2004)
3. Whitten, A., Tygar, J.: Usability of security: a case study. DTIC Document, Tech. Report (1998)
4. Merchant, K., Cai, J., Maurya, S.: System and method for authenticating a smart card using an authentication token transmitted to a smart card reader., US Patent 8,522,326, 27 Aug 2013
5. Blakley III, G.R., Hinton, H.M.: Method and system for proof-of-possession operations associated with authentication assertions in a heterogeneous federated environment. US Patent 8,554,930, 8 Oct 2013