1. Towards more secure cardholder verification in payment systems. In Z. Cai, C. Wang, S. Cheng, H. Wang, and H. Gao, editors, Wireless Algorithms, Systems, and Applications, volume 8491 of Lecture Notes in Computer Science;Alhothaily,2014
2. A novel verification method for payment card systems;Alhothaily;Personal and Ubiquitous Computing,2015
3. A. Alhothaily, C. Chu, A. Alrawais, T. Song, X. Cheng, and D. Chen. A secure and practical authentication scheme using personal devices. IEEE Access, 2017.
4. F. Aloul, S. Zahidi, and W. El-Hajj. Two factor authentication using mobile phones. In Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on, pages 641–644. IEEE, 2009.
5. Secure authentication scheme using dual channels in rogue access point environments. In Wireless Algorithms, Systems, and Applications;Alrawais,2014