1. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound;D Wang;IEEE Transactions on Dependable and Secure Computing,2018
2. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes;J Bonneau;Proceedings of the IEEE Symposium on Security and Privacy,2012
3. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data;Y Dodis;Proceedings of the Advances in Cryptology,2004
4. Algorithms for quantum computation: discrete logarithms and factoring;P Shor;Proceedings of the 35th Annual Symposium on Foundations of Computer Science,1994
5. Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices;Q Feng;IEEE Systems Journal