1. Aloul, F., Zahidi, S., & El-Hajj, W. (2009). Multi Factor Authentication Using Mobile Phones. International Journal of Mathematics and Computer Science, 4(2), 65–80.
2. Bhargav, S. A., Anna, C. S., & Modi, S. (2007). Privacy Preserving Multi-actor Authentication with Biometrics. Retrieved from www.slideshare.net/bspalabs/2007-privacy-preserving-multifactor-authentication-with-biometrics
3. Cardenas, C. (2013). Cloud Security: The Challenges with Key Management in the Cloud and everywhere else. Academic Press.
4. Chan, W., Leung, E., & Pili, H. (2012). Enterprise Risks Management For Cloud Computing. The Committee of Sponsoring Organizations of the Treadway Commission (COSO).
5. Chien, H. Y., Jan, J. K., & Tseng, Y.M. (2002). An efficient and practical solution to remote authentication: Smart card. Computer Security, 21(4).