{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:43Z","timestamp":1771661083981,"version":"3.50.1"},"publisher-location":"Cham","reference-count":76,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_69","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"1051-1070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Authentication Mechanisms and Classification: A Literature Survey"],"prefix":"10.1007","author":[{"given":"Ivaylo","family":"Chenchev","sequence":"first","affiliation":[]},{"given":"Adelina","family":"Aleksieva-Petrova","sequence":"additional","affiliation":[]},{"given":"Milen","family":"Petrov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","doi-asserted-by":"publisher","unstructured":"Carter, N.: Graphical passwords for older computer users. In: UIST 2015 Adjunct, Charlotte, NC, USA, 08\u201311 November 2015. ACM. https:\/\/doi.org\/10.1145\/2815585.2815593. 978-1-4503-3780-9\/15\/11","DOI":"10.1145\/2815585.2815593"},{"key":"69_CR2","doi-asserted-by":"publisher","unstructured":"Ratakonda, D.K.: Children\u2019s authentication: understanding and usage. In: IDC 2019, Boise, ID, USA, 12\u201315 June 2019. ACM. https:\/\/doi.org\/10.1145\/3311927.3325354. ISBN 978-1-4503-6690-8\/19\/06","DOI":"10.1145\/3311927.3325354"},{"key":"69_CR3","doi-asserted-by":"publisher","unstructured":"Atwady, Y., Hammoudeh, M.: A survey on authentication techniques for the Internet of Things. In: ICFNDS 2017, Cambridge, United Kingdom, 19\u201320 July 2017 (2017). https:\/\/doi.org\/10.1145\/3102304.3102312","DOI":"10.1145\/3102304.3102312"},{"key":"69_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932400","author":"SW Shah","year":"2019","unstructured":"Shah, S.W., Kanhere, S.S.: Recent trends in user authentication \u2013 a survey. IEEE Access (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2932400","journal-title":"IEEE Access"},{"key":"69_CR5","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/978-3-030-63092-8_63","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3","author":"I Chenchev","year":"2021","unstructured":"Chenchev, I., Nakov, O., Lazarova, M.: Security and performance considerations of improved password authentication algorithm, based on OTP and hash-chains. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FTC 2020. AISC, vol. 1290, pp. 921\u2013934. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-63092-8_63"},{"key":"69_CR6","doi-asserted-by":"publisher","unstructured":"Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M.: Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutor. 21(1) (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2863956","DOI":"10.1109\/COMST.2018.2863956"},{"key":"69_CR7","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, USA, May 1995. ISBN 978-0-262-74017-3"},{"key":"69_CR8","unstructured":"(RFC4880), [RFC4880] https:\/\/tools.ietf.org\/html\/rfc4880"},{"key":"69_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889996","author":"Z Rui","year":"2018","unstructured":"Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2889996","journal-title":"IEEE Access"},{"key":"69_CR10","doi-asserted-by":"publisher","unstructured":"Xu, Y., Li, Z., Yang, J., Zhang, D.: A survey of dictionary learning algorithms for face recognition. IEEE Access (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2695239","DOI":"10.1109\/ACCESS.2017.2695239"},{"key":"69_CR11","doi-asserted-by":"publisher","unstructured":"Zhou, H., Mian, A., Wei, L., Creighton, D., Hossny, M., Nahavandi, S.: Recent advances on singlemodal and multimodal face recognition: a survey. IEEE Trans. Hum.-Mach. Syst. 44(6) (2014). https:\/\/doi.org\/10.1109\/THMS.2014.2340578","DOI":"10.1109\/THMS.2014.2340578"},{"key":"69_CR12","doi-asserted-by":"publisher","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Biometric antispoofing methods: a survey in face recognition. IEEE Access (2014). https:\/\/doi.org\/10.1109\/ACCESS.2014.2381273","DOI":"10.1109\/ACCESS.2014.2381273"},{"key":"69_CR13","doi-asserted-by":"crossref","unstructured":"Hoffman, L.J.: Computers and privacy: a survey. Comput. Surv. 1(2), 85\u2013103 (1969). Article found in ACM Digital Library","DOI":"10.1145\/356546.356548"},{"key":"69_CR14","doi-asserted-by":"crossref","unstructured":"Peters, B.: Security considerations in a multi-programmed computer system. In: Proceedings of the AFIPS 1967 Spring Joint Computer Conference, vol. 30, pp. 283\u2013286. Thompson Book Co., Washington, D.C. (1967)","DOI":"10.1145\/1465482.1465524"},{"key":"69_CR15","doi-asserted-by":"crossref","unstructured":"Petersen, H.E., Turn, R.: System implications of information privacy. In: Spring Joint Computer Conference, 17\u201319 April 1967, vol. 30, pp. 291\u2013300. Thompson Book Co., Washington, D.C. (1967). (Also available as Doc. P-3504, Rand Corp., Santa Monica, California, Apr. 1967)","DOI":"10.1145\/1465482.1465526"},{"issue":"11","key":"69_CR16","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"69_CR17","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2018.02.010","volume":"75","author":"C-S Park","year":"2018","unstructured":"Park, C.-S.: One-time password based on hash chain without shared secret and re-registration. Compt. Secur. 75, 138\u2013146 (2018)","journal-title":"Compt. Secur."},{"issue":"12","key":"69_CR18","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/JPROC.2003.819605","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2019\u20132040 (2003)","journal-title":"Proc. IEEE"},{"key":"69_CR19","doi-asserted-by":"publisher","unstructured":"Arias-Cabarcos, P., Krupitzer, C., Becker, C.: A survey on adaptive authentication. ACM Comput. Surv. 52(4) (2019). https:\/\/doi.org\/10.1145\/3336117. Article no. 80, 30 pages","DOI":"10.1145\/3336117"},{"key":"69_CR20","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"NL Clarke","year":"2005","unstructured":"Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones \u2013 a survey of attitudes and practices. Comput. Secur. 24, 519\u2013527 (2005). https:\/\/doi.org\/10.1016\/j.cose.2005.08.003","journal-title":"Comput. Secur."},{"key":"69_CR21","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(05)00212-6","volume":"2005","author":"S Furnell","year":"2005","unstructured":"Furnell, S.: Authenticating ourselves: will we ever escape the password? Netw. Secur. 2005, 8\u201313 (2005)","journal-title":"Netw. Secur."},{"key":"69_CR22","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"I-E Liao","year":"2006","unstructured":"Liao, I.-E., Lee, C.-C., Hwang, M.-S.: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72, 727\u2013740 (2006). https:\/\/doi.org\/10.1016\/j.jcss.2005.10.001","journal-title":"J. Comput. Syst. Sci."},{"key":"69_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S0020-0190(97)00046-X","volume":"62","author":"S-M Yen","year":"1997","unstructured":"Yen, S.-M., Liao, K.-H.: Shared authentication token secure against replay and weak key attacks. Inf. Process. Lett. 62, 77\u201380 (1997)","journal-title":"Inf. Process. Lett."},{"key":"69_CR24","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.patcog.2006.05.018","volume":"40","author":"C-S Chan","year":"2007","unstructured":"Chan, C.-S., Chang, C.-C.: An efficient image authentication method based on Hamming code. Pattern Recogn. 40, 681\u2013690 (2007). https:\/\/doi.org\/10.1016\/j.patcog.2006.05.018","journal-title":"Pattern Recogn."},{"key":"69_CR25","doi-asserted-by":"crossref","unstructured":"Gold, S.: Password alternatives. Network Security. Elsevier, September 2010","DOI":"10.1016\/S1353-4858(10)70116-1"},{"key":"69_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2018.06.007","volume":"78","author":"M Guerar","year":"2018","unstructured":"Guerar, M., Merlo, A., Migliardi, M., Palmieri, F.: Invisible CAPTCHA: a usable mechanism to distinguish between malware and humans on the mobile IoT. Comput. Secur. 78, 255\u2013266 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.06.007","journal-title":"Comput. Secur."},{"key":"69_CR27","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.pmcj.2017.06.017","volume":"40","author":"K Halunen","year":"2017","unstructured":"Halunen, K., Haikio, J., Vallivaara, V.: Evaluation of user authentication methods in the gadget-free world. Pervasive Mob. Comput. 40, 220\u2013241 (2017). https:\/\/doi.org\/10.1016\/j.pmcj.2017.06.017","journal-title":"Pervasive Mob. Comput."},{"key":"69_CR28","doi-asserted-by":"publisher","unstructured":"Dossogne, J., Lafitte, F.: On authentication factors: \u201cwhat you can\u201d and \u201chow you do it\u201d. In: SIN 2013, Aksaray, Turkey, 26\u201328 November 2013. ACM (2013). https:\/\/doi.org\/10.1145\/2523514.2523528","DOI":"10.1145\/2523514.2523528"},{"key":"69_CR29","doi-asserted-by":"publisher","unstructured":"Peiset, S., Talbot, E., Kroeger, T.: Principles of authentication. In: NSPW 2013, Banff, Canada, 9\u201312 September 2013. ACM (2013). https:\/\/doi.org\/10.1145\/2535813.2535819","DOI":"10.1145\/2535813.2535819"},{"key":"69_CR30","doi-asserted-by":"crossref","unstructured":"Singh, K.: On improvements to password security. ACM (1985)","DOI":"10.1145\/1041490.1041496"},{"issue":"11","key":"69_CR31","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594\u2013597 (1979)","journal-title":"Commun. ACM"},{"key":"69_CR32","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: CCS 1999, 11\/99, Singapore. ACM (1999)","DOI":"10.1145\/319709.319720"},{"key":"69_CR33","doi-asserted-by":"crossref","unstructured":"Shay, R., et al.: Encountering stronger password requirements: user attitudes and behaviors. In: Symposium on Usable Privacy and Security (SOUPS) 2010, Redmond, WA USA, 14\u201316 July 2010. ACM (2010)","DOI":"10.1145\/1837110.1837113"},{"key":"69_CR34","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: International World Wide Web Conference Committee (IW3C2) 2005, Chiba, Japan, 10\u201314 May 2005. ACM (2005)","DOI":"10.1145\/1060745.1060815"},{"key":"69_CR35","unstructured":"Garrison, C.P.: Encouraging good passwords. In: InfoSecCD Conference 2006, Kennesaw, GA, USA, 22\u201323 September 2006. ACM (2006)"},{"key":"69_CR36","unstructured":"Fordyce, T., Green, S., Gros, Th.: Investigation of the effect of fear and stress on password choice. In: 7th ACM Workshop on Socio-Technical Aspects in Security and Trust, Orlando, Florida, USA, (STAST 2017), December 2017 (2017). https:\/\/doi.org\/10.475\/123_4"},{"key":"69_CR37","unstructured":"Read, J.C., Cassidy, B.: Designing textual password systems for children. In: IDC 2012, Bremen, Germany, 12\u201315 June 2012 (2012)"},{"key":"69_CR38","doi-asserted-by":"crossref","unstructured":"Wright, N., Patrick, A.S., Biddle, R.: Do you see your password? Applying recognition to textual passwords. In: Symposium on Usable Privacy and Security (SOUPS) 2012, Washington, DC, USA, 11\u201313 July 2012 (2012)","DOI":"10.1145\/2335356.2335367"},{"key":"69_CR39","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: International World Wide Web Conference Committee (IW3C2) 2007, Banff, Alberta, Canada, 8\u201312 May 2007. ACM (2007)"},{"key":"69_CR40","unstructured":"Lee, C., Lee, H.: A password stretching method using user specific salts. In: WWW 2007, Banff, Alberta, Canada, 8\u201312 May 2007. ACM (2007)"},{"key":"69_CR41","unstructured":"Korkmaz, I., Dalkilic, M.E.: The weak and the strong password preferences: a case study on Turkish users. In: SIN 2010, Taganrog, Rostov-on-Don, Russian Federation, 7\u201311 September 2010. ACM (2010)"},{"key":"69_CR42","unstructured":"Brown, M., Doswell, F.R.: Using passtones instead of passwords. In: ACMSE 2010, Oxford, MS, USA, 15\u201317 April 2010. ACM (2010)"},{"key":"69_CR43","doi-asserted-by":"publisher","unstructured":"Hadjidemetriou, G., et al.: Picture passwords in mixed reality: implementation and evaluation. In: CHI 2019 Extended Abstracts, Glasgow, Scotland UK, 4\u20139 May 2019. ACM (2019). https:\/\/doi.org\/10.1145\/3290607.3313076","DOI":"10.1145\/3290607.3313076"},{"key":"69_CR44","unstructured":"Houshmand, S., Aggarwal, S.: Building better passwords using probabilistic techniques. In: ACSAC 2012, Orlando, Florida, USA, 3\u20137 December 2012. ACM (2012)"},{"key":"69_CR45","doi-asserted-by":"publisher","unstructured":"Manjula Shenoy, K., Supriya, A.: Authentication using alignment of the graphical password. In: ICAICR 2019, Shimla, H.P., India, 15\u201316 June 2019. ACM (2019). https:\/\/doi.org\/10.1145\/3339311.3339332","DOI":"10.1145\/3339311.3339332"},{"key":"69_CR46","doi-asserted-by":"publisher","unstructured":"Chang, Y.-F., Chang, C.-C.: A secure and efficient strong-password authentication protocol. ACM SIGOPS Oper. Syst. Rev. (2004). https:\/\/doi.org\/10.1145\/1035834.1035844","DOI":"10.1145\/1035834.1035844"},{"key":"69_CR47","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/971564.971595","volume":"10","author":"B Schneier","year":"2004","unstructured":"Schneier, B.: Sensible authentication. ACM Queue 10, 74\u201378 (2004)","journal-title":"ACM Queue"},{"key":"69_CR48","doi-asserted-by":"publisher","unstructured":"Alhothaily, A., et al.: A secure and practical authentication scheme using personal devices. IEEE Access 5 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2717862","DOI":"10.1109\/ACCESS.2017.2717862"},{"key":"69_CR49","doi-asserted-by":"publisher","first-page":"28956","DOI":"10.1109\/ACCESS.2020.2971024","volume":"8","author":"A Derhab","year":"2020","unstructured":"Derhab, A., et al.: Two-factor mutual authentication offloading for mobile cloud computing. IEEE Access 8, 28956\u201328969 (2020)","journal-title":"IEEE Access"},{"key":"69_CR50","doi-asserted-by":"publisher","first-page":"34527","DOI":"10.1109\/ACCESS.2018.2845299","volume":"6","author":"Z Siddiqui","year":"2018","unstructured":"Siddiqui, Z., Tayan, O., Khan, M.K.: Security analysis of smartphone and cloud computing authentication frameworks and protocols. IEEE Access 6, 34527\u201334542 (2018)","journal-title":"IEEE Access"},{"key":"69_CR51","doi-asserted-by":"publisher","unstructured":"Mohsin, J.K., Han, L., Hammoudeh, M.: Two factor vs multi-factor, an authentication battle in mobile cloud computing environments. In: ACM ICFNDS 2017, Cambridge, United Kingdom, 19\u201320 July 2017 (2017). https:\/\/doi.org\/10.1145\/3102304.3102343","DOI":"10.1145\/3102304.3102343"},{"key":"69_CR52","doi-asserted-by":"publisher","unstructured":"Ku, Y., Park, L.H., Shin, S., Kwon, T.: POSTER: a guided approach to behavioral authentication. In: CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3278488","DOI":"10.1145\/3243734.3278488"},{"issue":"5","key":"69_CR53","first-page":"81","volume":"33","author":"C Gong","year":"2018","unstructured":"Gong, C., Behar, B.: Understanding password security through password cracking. JCSC 33(5), 81\u201387 (2018)","journal-title":"JCSC"},{"key":"69_CR54","doi-asserted-by":"publisher","unstructured":"Nguyen, M., Tran, H., Le, H., Yan, W.Q.: A tile based color picture with hidden QR code for augmented reality and beyond. In: VRST 2017, Gothenburg, Sweden, 8\u201310 November 2017. ACM (2017). https:\/\/doi.org\/10.1145\/3139131.3139164","DOI":"10.1145\/3139131.3139164"},{"key":"69_CR55","doi-asserted-by":"publisher","unstructured":"Shay, R., et al.: Can long passwords be secure and usable? In: CHI 2014, Toronto, ON, Canada, 26 April\u201301 May 2014. ACM (2014). https:\/\/doi.org\/10.1145\/2556288.2557377","DOI":"10.1145\/2556288.2557377"},{"key":"69_CR56","doi-asserted-by":"publisher","unstructured":"Abuarqoub, A.: A lightweight two-factor authentication scheme for mobile cloud computing. In: ICFNDS 2019, Paris, France, 1\u20132 July 2019. ACM (2019). https:\/\/doi.org\/10.1145\/3341325.3342020","DOI":"10.1145\/3341325.3342020"},{"key":"69_CR57","doi-asserted-by":"publisher","unstructured":"Kogan, D., Manohar, N., Boneh, D.: T\/Key: second-factor authentication from secure hash chains. In: CCS 2017, Dallas, TX, USA, 30 October\u20133 November 2017. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3133989","DOI":"10.1145\/3133956.3133989"},{"key":"69_CR58","doi-asserted-by":"publisher","unstructured":"Buccafurri, F., Romolo, C.: A blockchain-based OTP-authentication scheme for constrained IoT devices using MQTT. In: ISCSIC 2019, Amsterdam, Netherlands, 25\u201327 September 2019. ACM (2019). https:\/\/doi.org\/10.1145\/3386164.3389095","DOI":"10.1145\/3386164.3389095"},{"key":"69_CR59","doi-asserted-by":"publisher","unstructured":"Xiong, L., Li, F., Zeng, S., Peng, T., Liu, Z.: A blockchain-based privacy-awareness authentication scheme with efficient revocation for multi-server architectures. IEEE Access 7 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2939368","DOI":"10.1109\/ACCESS.2019.2939368"},{"key":"69_CR60","doi-asserted-by":"publisher","unstructured":"Tang, F., Ma, S., Xiang, Y., Lin, C.: An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2904300","DOI":"10.1109\/ACCESS.2019.2904300"},{"key":"69_CR61","doi-asserted-by":"publisher","unstructured":"Wang, X., et al.: An improved authentication scheme for internet of vehicles based on blockchain technology. IEEE Access 7 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2909004","DOI":"10.1109\/ACCESS.2019.2909004"},{"key":"69_CR62","doi-asserted-by":"publisher","unstructured":"Tan, H., Chung, I.: Secure authentication and key management with blockchain in VANETs. IEEE Access 8 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2962387","DOI":"10.1109\/ACCESS.2019.2962387"},{"key":"69_CR63","doi-asserted-by":"publisher","unstructured":"Alaca, F., van Oorschot, P.C.: Device fingerprinting for augmenting web authentication: classification and analysis of methods. In: ACSAC 2016, Los Angelis, CA, USA, 05\u201309 December 2016. ACM (2016). https:\/\/doi.org\/10.1145\/2991079.2991091","DOI":"10.1145\/2991079.2991091"},{"key":"69_CR64","doi-asserted-by":"publisher","unstructured":"Lin, F., et al.: Brain password: a secure and truly cancelable brain biometrics for smart headwear. In: MobiSys 2018, Munich, Germany, 10\u201315 June 2018. ACM (2018). https:\/\/doi.org\/10.1145\/3210240.3210344","DOI":"10.1145\/3210240.3210344"},{"key":"69_CR65","doi-asserted-by":"crossref","unstructured":"Chuda, D., Durfina, M.: Multifactor authentication based on keystroke dynamics. In: International Conference on Computer Systems and Technologies \u2013 CompSysTech 2009. ACM (2009)","DOI":"10.1145\/1731740.1731836"},{"key":"69_CR66","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Christin, N.: Use your illusion: secure authentication usable anywhere. In: Symposium on Usable Privacy and Security (SOUPS) 2008, Pittsburgh, PA, USA, 23\u201325 July 2008. ACM (2008)","DOI":"10.1145\/1408664.1408670"},{"key":"69_CR67","doi-asserted-by":"publisher","unstructured":"Mustafa, T., et al.: Unsure how to authenticate on your VR headset? Come on, use your head! In: Authentication, Software, Vulnerabilities, Security Analytics, IQSPA 2018, Tempe, AZ, USA, 21 March 2018. ACM (2018). https:\/\/doi.org\/10.1145\/3180445.3180450","DOI":"10.1145\/3180445.3180450"},{"key":"69_CR68","doi-asserted-by":"publisher","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Choose your own authentication. In: NSPW 2015, Twente, Netherlands, 08\u201311 September 2015. ACM (2015). https:\/\/doi.org\/10.1145\/2841113.2841114","DOI":"10.1145\/2841113.2841114"},{"key":"69_CR69","doi-asserted-by":"publisher","unstructured":"Renuka, K., Kumari, S., Zhao, D., Li, L.: Authentication scheme for M2M networks in IoT enabled cyber-physical systems. IEEE Access 7 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2908499","DOI":"10.1109\/ACCESS.2019.2908499"},{"key":"69_CR70","doi-asserted-by":"publisher","unstructured":"Batool, S., Hassan, A., Saqib, N., Khattak, M.: Authentication of remote IoT users based on deeper gait analysis of sensor data. IEEE Access 8 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2998412","DOI":"10.1109\/ACCESS.2020.2998412"},{"key":"69_CR71","doi-asserted-by":"crossref","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient and secure authentication key exchange using weak passwords. J. ACM 57(1) (2009). https:\/\/doi.acm.org\/10.1145\/1613676.1613679. Article no. 3","DOI":"10.1145\/1613676.1613679"},{"key":"69_CR72","doi-asserted-by":"crossref","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM SIGCOMM Comput. Commun. Rev. (1996)","DOI":"10.1145\/242896.242897"},{"issue":"3","key":"69_CR73","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S Halevi","year":"1999","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. 2(3), 230\u2013268 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"69_CR74","unstructured":"Stebila, D., Udupi, P., Chang, S.: Multi-factor password-authenticated key exchange. In: Proceedings of the 8th Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT Volume 105 \u2013 Information Security 2010. ACM (2010)"},{"key":"69_CR75","doi-asserted-by":"publisher","unstructured":"Kim, S.-H., Choi, D., Jin, S.-H., Lee, S.-H.: Geo-location based QR-code authentication scheme to defeat active real-time phishing attack. In: DIM 2013, Berlin, Germany, 08 November 2013. ACM Workshop on Digital Identity Management (2013). https:\/\/doi.org\/10.1145\/2517881.2517889","DOI":"10.1145\/2517881.2517889"},{"key":"69_CR76","doi-asserted-by":"publisher","unstructured":"Hayashi, E., et al.: Web ticket: account management using printable tokens. In: CHI 2012, SIGCHI Conference on Human Factors in Computing Systems, May 2012, pp. 997\u20131006. ACM (2012). https:\/\/doi.org\/10.1145\/2207676.2208545","DOI":"10.1145\/2207676.2208545"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:19Z","timestamp":1771658059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":76,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_69","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}