1. A Secure Human-Computer Authentication Scheme;Hopper;Lecture Notes in Computer Science,,2000
2. NLHB: A non-linear Hopper-Blum protocol 2010 IEEE International Symposium on Information Theory;Madhavan,2010
3. A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols, Advances in Cryptology - CRYPTO 2005, vol 3621.
4. Parallel and Concurrent Security of the HB and HB+ Protocols;Katz,2006
5. S. Li, H.-Y. Shum. Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI. IACR's Cryptology ePrint Archive: Report 2005/268.