1. How to Attack Two-Factor Authentication Internet Banking
2. Two factor authentication using mobile phones;F.Aloul;International Conference Computer Systems and Applications,2009
3. Arnault, F. (n.d.). Theorie des nombres et cryptographie. Retrieved from http://www.unilim.fr/pages/_perso/francois.arnault/documents/polycrypto.ps
4. Maintaining User-Level Security in Short Message Service, International Journal of Computer, Electrical, Automation;T.Arudchelvam;Control and Information Engineering,2016
5. Brown, J., Shipman, B., & Vetter, R. (2007). SMS: The short message service.