1. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound;Wang;IEEE Trans Dependable Secure Comput,2018
2. Bonneau J, Herley C, Oorschot PCv, Stajano F. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In: Proceedings of the IEEE symposium on security and privacy. 2012, p. 553–67.
3. A Secure Mobile OTP Token;Cheng,2010
4. The Mobile Phone as a Multi OTP Device Using Trusted Computing;Alzomai,2010
5. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data;Dodis,2004