Authentication Schemes and Methods A Systematic Literature Review
Authentication Schemes and Methods A Systematic Literature Review
PII: S0950-5849(16)30150-1
DOI: 10.1016/j.infsof.2017.09.012
Reference: INFSOF 5885
Please cite this article as: Ignacio Velásquez , Angélica Caro , Alfonso Rodrı́guez , Authentication
Schemes and Methods: a Systematic Literature Review, Information and Software Technology (2017),
doi: 10.1016/j.infsof.2017.09.012
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service
to our customers we are providing this early version of the manuscript. The manuscript will undergo
copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please
note that during the production process errors may be discovered which could affect the content, and
all legal disclaimers that apply to the journal pertain.
ACCEPTED MANUSCRIPT
T
Computer Science and Information Technologies Department,
University of Bío-Bío, Chillán, Chile
IP
[email protected], {mcaro, alfonso}@ubiobio.cl
CR
Abstract. Context: There is a great variety of techniques for performing
authentication, like the use of text passwords or smart cards. Some techniques
combine others into one, which is known as multi-factor authentication. There
is an interest in knowing existing authentication techniques, including those
US
aimed at multi-factor authentication, and the frameworks that can be found in
literature that are used to compare and select these techniques according to
different criteria.
Objective: This article aims to gather the existing knowledge on authentication
AN
techniques and ways to discern the most effective ones for different contexts.
Method: A systematic literature review is performed in order to gather existing
authentication techniques proposed in literature and ways to compare and select
them in different contexts. A total of 515 single-factor and 442 multi-factor
authentication techniques have been found. Furthermore, 17 articles regarding
M
Conclusion: The review shows that a vast research has been done for
authentication techniques, although its use in some contexts has not been
researched as much. The lack of works regarding the comparison and selection
of authentication techniques is observed.
AC
1 Introduction
One of the most serious security threats to any computing device is impersonation of
an authorized user. User authentication is the first line of defense against this threat
[1], and is a central component of any security infrastructure [2]. Authentication is the
process of positively verifying a user’s identity, device or other entity in a computer
system, often as a prerequisite to allowing access to resources in the system [3].
T
An authentication factor is a piece of information used to authenticate or verify the
identity of a user [4]. These factors can be categorized in three groups [17, 18]: those
IP
based on the knowledge factor (what the client knows, like text passwords [5, 6, 7] or
graphical passwords [8, 9, 10]), those based on the possession factor (what the client
CR
owns, dependent of a physical possession, like smart cards [11, 12, 13]) and those
based on the inherence factor (who the client is, biometrics, like face recognition [14],
fingerprints [15] and keystroke dynamics [16]). Although there are other factors
proposed in literature, such as the use of a person’s social networks [19] and location-
based authentication [20], the three above are the most used and well-known factors.
US
Authentication techniques belonging to different factors can be combined to
enhance security, which is known as multi-factor authentication [3]. Some examples
of multi-factor authentication are the combination of the knowledge and possession
factors [21, 22], the combination of the knowledge and inherence factors [23, 24], the
AN
combination of the possession and inherence factors [25, 26], and the combination of
all three well-known factors [27, 28]. In this article, authentication techniques that
belong to a single authentication factor will be referred to as authentication schemes,
whereas combinations of techniques from different factors will be referred to as
M
criteria for this comparison and selection. This information could be useful for
industry experts when faced with the job of selecting the most adequate authentication
schemes or methods for their applications. Additionally, a detailed review of existing
authentication schemes and multi-factor authentication methods is performed, in order
PT
to know the current research that has been done in this area.
The remainder of the article is organized as follows: section 2 explains the used
research methodology. In section 3, the whole planning process of the SLR is
presented, whereas its results are shown in section 4, and a discussion about the main
CE
2 Research Methodology
T
IP
CR
Fig. 1. Systematic literature review process applied in this research.
First, a planning of the review was performed from which, together with the
identification of the need for research, the search and review protocols to be used
were obtained. Two supervisors analyzed this planning to evaluate its adequacy.
US
Afterwards, a general search was performed in different sources as specified by the
review planning. From the search’s results, the duplicate articles were removed, and a
partial review was performed on the remaining articles, obtaining a list of selected
articles that were potentially useful. The selected articles were reviewed and analyzed
AN
in depth and the list with useful articles for this research was obtained. The details of
the review planning are specified in section 3, whereas the results from performing
the search and review process can be found in section 4.
M
3 Review Planning
ED
The identification of the need for research, together with the search and review
protocols used for the SLR are specified as follows:
methods, while also detecting criteria used for their comparison and selection and the
existence of frameworks that handle such a task. Based on this objective, the
following Questions (Q) were formulated to further define the need of investigation:
Q1. Which are the main authentication schemes that exist in the literature?
AC
Q2. What combinations of these schemes can be found that can be used as multi-
factor authentication methods?
Q3. What criteria can be used to compare and/or to select between authentication
schemes or multi-factor authentication methods?
Q4. Are there frameworks that help to compare and/or to select authentication
schemes or multi-factor authentication methods? What are their
characteristics?
ACCEPTED MANUSCRIPT
In order to perform the SLR, sources that are related to the topic at hand were used,
specifically, Scopus (https://www.scopus.com/), Science Direct
(http://www.sciencedirect.com/), IEEE (http://ieeexplore.ieee.org/Xplore/home.jsp),
ACM (http://dl.acm.org/) and Springer (http://link.springer.com/).
Additionally, Google Scholar (https://scholar.google.com/) was used to deepen in
T
the research for those potentially useful publications not indexed in the previously
mentioned sources.
IP
3.3 Search Protocol
CR
This defines the protocol that was used for performing the search in the sources
defined above. Thus, the Terms (T) used for the review, as well as their Combinations
(C) were defined (see Table 1).
US
Table 1. Terms and combinations used to perform the SLR.
Some general guides for the realization of the search in accordance to each of the
resources specified above were defined, between them:
In some cases, the search terms can be entered in an escalated way, restricting
PT
An online reference manager was used to facilitate the recording of the search
results and their source. Moreover, the results of each search were recorded in a table
containing the source, the combination of terms, the number of found articles and the
search date for each search. For every entry in the previously described table, another
table was used to record every reviewed article’s reference, their acceptance or
rejection, a brief description explaining the motive of acceptance or rejection and the
acceptance topic to which they belong.
ACCEPTED MANUSCRIPT
A partial review was performed in order to obtain potentially useful articles for the
research. For reviewing every article in this step, the abstract of each one was read. If
needed, their introduction and conclusions were also read, while on some specific
cases part of the article’s body was read as well. Once every reading had been made,
the decision to include or not the article as a potentially useful article was done, in
T
accordance to this protocol’s criteria. A control on the accepted and rejected articles
was kept by using the tables described above.
IP
Every article that was related to any of the following Acceptance Topics (AT),
each related to one of the research questions formulated above, was included:
AT1. Authentication schemes.
CR
AT2. Multi-factor authentication methods.
AT3. Comparison and selection criteria for authentication schemes or multi-
factor authentication methods.
AT4. Frameworks that support the decision of authentication schemes or multi-
factor authentication methods.
US
On the other hand, any article that contained the search terms or combinations of
them, but did not contain relevant information on the topic at hand, was excluded.
AN
An in-depth analysis of these potential articles was performed afterwards,
according to the acceptance topic of each article. For the articles in AT1 and AT2, the
authentication scheme or method, together with the authentication factor to which
they belong and (if mentioned) the context that the scheme or method was proposed
for were identified. A thorough analysis of the articles in AT3 and AT4 was realized,
M
in order to adequately understand their proposals and to identify their pros and cons,
emphasizing the criteria used in each one.
The information of the accepted articles was extracted, synthetized and stored in a
ED
table according to their acceptance topic. For authentication schemes, the reference,
the proposed scheme, the authentication factor to which they belong and a brief
description were stored. For multi-factor authentication methods, the reference, the
combined factors, the specific schemes and a brief description were stored. For the
comparison and selection criteria, the reference, the used criteria and a brief
PT
description were stored. Finally, for the decision frameworks, the reference, a brief
description and observed strengths and weaknesses were stored.
CE
4 Results
A search was performed for every combination of terms in every source specified in
AC
the search protocol, in total 54 different searches were done. For each search, 200
publications were reviewed. However 15 of these yielded less than 200 results and,
among them, 5 yielded no results. This way, a total of 8,153 articles were reviewed.
In order to improve the obtained results, some extra refinements were made on
some of the sources: in Scopus, the subject area was limited to Computer Science,
ACCEPTED MANUSCRIPT
whereas in Springer the content type was refined to article and in Google Scholar
patents and citations were excluded.
Out of the 8,153 articles, those that were repeated were eliminated, obtaining a
total of 3,910 different articles. After a superficial review, 1,015 of them were
considered potentially useful articles. A detailed analysis was performed afterwards,
and it was noticed that 33 of the potential articles were not relevant for the current
research, so they were discarded, leaving a total of 982 useful and accepted articles,
T
split between the four acceptance topics as shown in Table 2.
IP
Table 2. Accepted articles split between each Acceptance Topic.
Number of Accepted
CR
Acceptance Topic
Articles
AT1 515
AT2 442
AT3 17
AT4
Total
US 8
982
A list containing all of the references for the accepted articles in this SLR can be
AN
found in the supplementary materials (http://colvin.chillan.ubiobio.cl/mcaro/). The
remainder of this section shows the analysis of the useful articles according to each
acceptance topic.
M
Over 50% of the accepted articles, 515, belong to AT1. The reason for it could be that
authentication schemes are the base for the topics discussed in AT2, AT3 and AT4, so
ED
they have been addressed more often in literature. As for the results, 217 of the
articles focus on the proposal of schemes pertaining to the inherence factor, whereas
169 propose the use of the possession factor and 124 the knowledge factor. The
remaining 5 articles are related to other authentication factors that have been proposed
PT
Number of
Factor Scheme
Articles
Knowledge Text Passwords 44
AC
Graphical Passwords 42
Cognitive Authentication 25
Personal Identification Number (PIN) 7
Questions 4
Other Knowledge-Based Schemes 2
Total 124
Possession ID-Based (Smart Cards) 103
ACCEPTED MANUSCRIPT
T
Palmprint Biometrics 12
Touchstroke Biometrics 11
IP
Fingerprints 10
Iris Biometrics 8
Brainwaves 5
Heartbeats 5
CR
Knuckleprint Biometrics 5
Gait Biometrics 4
Multi-Modal Biometrics 19
Other Biometrics 17
Other Factors
Biometrics (Undefined)
US
Behavioral Biometrics (Undefined)
Total
Grand Total
13
48
217
5
515
AN
The text passwords scheme, the most widely used scheme nowadays [30], is the
authentication scheme that belongs to the knowledge factor with the most related
articles (44), followed by the graphical passwords scheme, with 42 articles. On the
M
other hand, the vast majority of proposals regarding to the possession factor are
related to the use of smart cards, with 103 out of 169 articles, which corresponds to
60.1% of them. There are many different articles related to the use of biometrics for
the inherence factor, although 48 of those do not define a specific biometric for their
ED
proposal, and 13 others only mention the use of behavioral biometrics but not a
particular one.
Most of the articles found have been published from 2000 onwards (505) and only
10 where published before. An increasing interest in the topic of authentication
PT
schemes can be noticed, as the number of articles related to it has been increasing
over the years, with the exception of 2012, which has a notorious decrease in research
compared to its prior year. 2015 is the year with the most publications related to
authentication schemes, with 82 articles, whereas 2001 has the least, with only one.
CE
The oldest accepted article dates to 1974 [31], and proposes the use of text passwords.
No article prior to 2000 discusses the use of schemes related to the possession factor.
The graphic in Fig. 2 shows the accepted articles and the authentication factor to
which they belong, split per year. It is important to mention that this review was
AC
performed between the second and third quarters of 2016, so not all of the articles of
this year are present.
ACCEPTED MANUSCRIPT
T
IP
CR
US
Fig. 2. Authentication factors according to publication year.
The context for which every authentication scheme was proposed was recorded.
The mobile environment was the most common context, followed by remote
AN
authentication and healthcare/telecare. It is important to mention that more than half
of the articles, 282, did not specify a particular context for their proposal. The
different contexts that have been found can be seen in Table 4, along with how many
schemes for each authentication factor are proposed in each of them.
M
Total
Possession
Knowledge
Inherence
Factors
Factor
Other
ED
Context
PT
Continuous Authentication 0 0 11 0 11
Wireless Sensor Networks 2 7 1 0 10
Cloud Computing 1 6 2 0 9
Banking and Commerce 2 4 2 0 8
AC
Smart Environment 0 6 1 0 7
Session Initiation Protocol 1 2 2 0 5
Web Applications 2 1 1 1 5
Other Contexts 4 6 4 0 14
Not Specified 82 66 130 4 282
Total 124 169 217 5 515
ACCEPTED MANUSCRIPT
For the AT2, 442 articles were found. Most of the accepted articles correspond to
proposals of methods that combine schemes from the knowledge and possession
factors, adding up to 270 articles, which corresponds to over 60% of the articles.
There are 44 proposals that combine the knowledge and inherence factors and 43 that
combine the possession and inherence factors. On the other hand, 68 proposals
T
combine the three factors. Twelve articles were found that did not propose a specific
combination of factors, but rather proposed the use of different factors according to
IP
different situations. Similar to AT1, 5 articles were found that proposed multi-factor
authentication methods whose factor combinations included a factor proposed in
literature that was not among the three well-known ones. Table 5 presents the multi-
CR
factor authentication method proposals found in literature, the combination of factors
to which they belong and the number of articles that propose each of them.
Combination
Knowledge AND
Method US
Text Passwords AND ID-Based
Number of
Articles
188
AN
Possession Text Passwords AND Mobile-Based 37
Text Passwords AND OTP 34
Other Methods 11
Total 270
Knowledge AND Text Passwords AND Biometrics 36
M
Other Combinations 5
Dynamic Methods 12
Grand Total 442
AC
The combination of text passwords and smart cards (ID-Based) is by far the one
with most number of articles, with a total of 188 (69.4%) of the articles combining the
knowledge and possession factors. Either text passwords and/or smart cards are seen
as the most used schemes together with biometrics for every other combination of
factors as well, highlighting the vast amount of research given to multi-factor
authentication methods based on these schemes.
ACCEPTED MANUSCRIPT
T
factors to which they belong, split per year. Remind that this review was performed
between the second and third quarters of 2016, so not all of the articles of said year
IP
are present.
CR
US
AN
M
The context for which every multi-factor authentication method was proposed was
recorded as well. As opposed to authentication schemes, only a 38.7% of them did not
mention the context for which they were proposed. Remote authentication and
healthcare/telecare are the two most recurrent contexts, but unlike for authentication
PT
Total
Other Combinations
Knowledge AND Possession
AND Inherence
Dynamic
Possession AND Inherence
T
IP
Context
CR
Remote Authentication 45 1 8 10 0 0 64
Healthcare / Telecare 29 3 2 14 0 0 48
Wireless Sensor Networks 28 0 1 4 0 0 33
Multi Server Environment 18 1 4 6 0 0 29
Mobile Environment and Touch Screens
Cloud Computing
Banking and Commerce
Web Applications
US 11
10
8
10
8
2
1
1
0
1
1
0
2
3
0
0
0
0
0
0
0
1
1
0
21
17
11
11
AN
Wireless Networks 7 0 0 1 0 0 8
USB Devices 3 0 0 3 0 0 6
Unsafe Environment 4 0 1 0 0 0 5
Other Contexts 10 2 3 2 1 1 19
Not Specified 87 25 22 23 4 9 170
M
Another goal of this review was to identify different selection and comparison criteria
used to decide on what authentication scheme or multi-factor authentication method
to use in a given situation. 17 articles regarding this topic were found. All of these
PT
consider one or more criteria for comparing authentication schemes or methods, being
usability and security criteria the two most used, each one addressed in 9 different
articles.
Criteria related to the scheme or method’s costs are used 5 times, and those
CE
regarding the context where the scheme or method will be used are used twice. Other
seven criteria, such as future tendencies of the scheme or method or its privacy, are
proposed as well among different articles, but each of them is proposed only once. It
could be observed that many of the relevant articles proposed the use of two or more
AC
T
IP
CR
US
Fig. 4. Contexts considered in articles regarding comparison and selection criteria.
AN
4.4 Decision Frameworks (AT4)
Eight decision frameworks have been found that help in the selection and comparison
of authentication schemes and/or multi-factor authentication methods. A brief
M
System [37]
Approach for selecting the Supports the selection of the most suitable automated
most suitable Automated identification from either the knowledge or the inherence
Personal Identification factors, considering both the context and stakeholders’
AC
T
User-centred authentication A framework oriented to researchers that evaluates
feature framework [42] knowledge-based schemes in regards to features related to
IP
persuasion, memory, input and output and obfuscation.
The oldest article found is from 2002 [37]. Most of the authentication scheme and
CR
multi-factor authentication method proposals found in this review are from years after
this framework’s publication, so its contents might be outdated. On the other hand,
the most recent article is from 2016 [41], and most scheme and method proposals
found are prior to this publication, so its contents are probably up to date.
5 Discussion
US
AN
The main findings and the limitations of this review are discussed here. This review
permits us to not only know about the state of the art on authentication schemes and
multi-factor authentication methods, but it also serves as a way to identify the
principal contexts in which they were proposed and used, while also giving an insight
M
on the criteria used when facing the need to decide on what scheme or method to use
in different contexts and the existing frameworks that perform this task.
Among authentication schemes, out of the three well-known authentication factors,
ED
the inherence factor is the most researched one, whereas the knowledge factor is the
least, perhaps due to the current paradigm that the most representative scheme of this
factor (text passwords) is not very secure [30]. Nevertheless, the most reviewed
scheme is smart card-based authentication, which belongs to the possession factor.
While some contexts were expected to be researched often, like the mobile
PT
environment, some others were not identified as often as it was expected, like banking
and commerce.
The combination of the knowledge and possession factors is very predominant in
CE
multi-factor authentication methods, especially the use of both text passwords and
smart cards. Three-factor authentication is the second most researched combination of
factors, although it seems to be the less widely applied one [3]. Both text passwords
and smart cards are used in 259 articles each, as one of the schemes considered in the
AC
comparison and selection was noticed. The context of use is also seen as an important
element, as the articles either consider this as one of the decision criteria [47] or the
article’s proposal itself is directed to a specific context [48, 49].
In regards to the decision frameworks, it can be seen that multi-factor
authentication is not considered often, whereas proposals that do focus solely in some
authentication aspects, leaving others aside. No framework could be found that
considered both single-factor and multi-factor authentication, together with enough
T
decision criteria for realizing a detailed comparison and selection of existing
authentication schemes or methods to be used.
IP
The acceptance of the articles for AT1 and AT2 was limited to those that directly
proposed a new authentication scheme or an improvement to an existing one. Also,
due to time constraints and the number of potentially useful articles in AT1 and AT2,
CR
only the relevant information for the review was extracted.
6 Conclusions
US
The realization of this SLR aimed at investigating the existing decision frameworks
and comparison and selection criteria related to authentication schemes and multi-
AN
factor authentication methods, together with the existing research on these schemes
and methods. Through this review, a total of 982 articles were found that either
discussed authentication schemes, multi-factor authentication methods or frameworks
and criteria that helped on the comparison and selection of these in different
environments. The main findings of this review, in relation to the formulated research
M
biometrics proposals for the inherence factor. The most researched scheme is
smart card-based authentication from the possession factor.
Q2. There are many different multi-factor authentication methods that combine
the authentication schemes from Q1. There are both combination proposals
PT
that consider two factors and others that consider three factors, there’s even a
proposal that considers four factors (the fourth being location-based
authentication). There’s a clear prevalence in the use of text passwords and
smart cards as one of the schemes used for the different combinations.
CE
The main purpose of this SLR was to ascertain existing decision frameworks and
criteria for the comparison and selection of authentication schemes or methods.
However, its results could also be useful for researchers as it can help them to analyze
the existing work on the different authentication schemes or methods that have been
T
found through its realization, thus identifying spaces to perform further research on
them. Some future work ideas are to research the existing authentication schemes or
IP
methods on contexts that have not been widely studied, such as social media, and to
evaluate the use of these contexts as a criterion for the comparison and selection of
authentication schemes or methods. The definition of a framework that helps in detail
CR
to the decision to use authentication schemes and/or multi-factor authentication
methods is considered as well.
Acknowledgments
US
This research is part of the following projects: DIUBB 144319 2/R and BuPERG
AN
(DIUBB 152419 G/EF).
References
M
1. Jansen, W.: Authenticating users on handheld devices. In: Proceedings of the Canadian
Information Technology Security Symposium, pp. 1-12. (2003)
2. Madhusudhan, R., Mittal, R.C.: Dynamic ID-based remote user password authentication
ED
schemes using smart cards: A review. Journal of Network and Computer Applications 35,
1235-1248 (2012)
3. O'Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication.
Proceedings of the IEEE 91, 2021-2040 (2003)
Rathgeb, C., Uhl, A.: Two-factor authentication or how to potentially counterfeit
PT
4.
experimental results in biometric systems. Image Analysis and Recognition, pp. 296-305.
Springer (2010)
5. Hafizul Islam, S.K., Biswas, G.P.: Design of improved password authentication and
update scheme based on elliptic curve cryptography. Mathematical and Computer
CE
7. Wang, S.-Q., Wang, J.-Y., Li, Y.-Z.: The Web Security Password Authentication based
the Single-block Hash Function. IERI Procedia 4, 2-7 (2013)
8. Mihajlov, M., Jerman-Blažič, B.: On designing usable and secure recognition-based
graphical authentication mechanisms. Interacting with Computers 23, 582-593 (2011)
9. Umar, M.S., Rafiq, M.Q.: Select-to-Spawn: A novel recognition-based graphical user
authentication scheme. In: 2012 IEEE International Conference on Signal Processing,
Computing and Control, ISPCC 2012. (2012)
ACCEPTED MANUSCRIPT
10. Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: A secure image-based authentication scheme for
mobile devices. In: Lecture Notes in Computer Science, pp. 751-760. (2005)
11. Cheul Shin, K., Jong Oh, K.: Smartcard-based remote authentication scheme preserving
user anonymity. International Journal of Information Processing and Management 4, 10-18
(2013)
12. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication
scheme for remote user login and verification. International Journal of Innovative
T
Computing, Information and Control 8, 5499-5511 (2012)
13. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for
wireless communications. International Journal of Security and its Applications 7, 1-16
IP
(2013)
14. Imtiaz, H., Fattah, S.A.: A face recognition scheme using wavelet-based local features. In:
Computers & Informatics (ISCI), 2011 IEEE Symposium on, pp. 313-316. (2011)
CR
15. Wang, P., Ku, C.-C., Wang, T.C.: A new fingerprint authentication scheme based on
secret-splitting for enhanced cloud security. Recent Application in Bio-metrics 183-196
(2011)
16. Wang, X., Guo, F., Ma, J.-f.: User authentication via keystroke dynamics based on
17. US
difference subspace and slope correlation degree. Digital Signal Processing 22, 707-712
(2012)
Al-Assam, H., Sellahewa, H., Jassim, S.: On security of multi-factor biometric
authentication. In: Internet Technology and Secured Transactions (ICITST), 2010
International Conference for, pp. 1-6. IEEE, (2010)
AN
18. Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-
factor authentication: Preserving security and privacy in distributed systems. IEEE
Transactions on Parallel and Distributed Systems 22, 1390-1397 (2011)
19. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication:
M
somebody you know. Proceedings of the 13th ACM conference on Computer and
communications security. ACM, Alexandria, Virginia, USA (2006)
20. Choi, S., Zage, D.: Addressing insider threat using “where you are” as fourth factor
authentication. In: Security Technology (ICCST), 2012 IEEE International Carnahan
ED
with fingerprint for mobile devices. In: Biometrics and Security Technologies, 2008.
ISBAST 2008. International Symposium on, pp. 1-8. (2008)
25. Tang, H.B., Zhu, Z.J., Gao, Z.W., Li, Y.: A secure biometric-based authentication scheme
using smart card. In: International Conference on Cyberspace Technology (CCT 2013),
AC
28. Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient generic framework for three-factor
authentication with provably secure instantiation. IEEE Transactions on Information
Forensics and Security 9, 2302-2313 (2014)
29. Kitchenham, B.: Procedures for Performing Systematic Reviews. Joint Technical Report,
Keele University TR/SE-0401 and NICTA 0400011T.1, 1--26 (2004)
30. Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords:
A framework for comparative evaluation of web authentication schemes. In: Security and
T
Privacy (SP), 2012 IEEE Symposium on, pp. 553-567. IEEE, (2012)
31. Arthur Evans, J., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring
secrecy in the computer. Commun. ACM 17, 437-442 (1974)
IP
32. Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEE
Proceedings E-Computers and Digital Techniques 138, 165-168 (1991)
CR
33. Park, K.C., Shin, J.W., Lee, B.G.: Analysis of Authentication Methods for Smartphone
Banking Service using ANP. TIIS 8, 2087-2103 (2014)
34. Kumari, S., Khan, M.K., Atiquzzaman, M.: User authentication schemes for wireless
sensor networks: A review. Ad Hoc Networks 27, 159-194 (2015)
35.
36. US
Kiljan, S., Vranken, H., van Eekelen, M.: Evaluation of transaction authentication methods
for online banking. Future Generation Computer Systems (2016)
Eliasson, C., Fiedler, M., Jørstad, I.: A criteria-based evaluation framework for
authentication schemes in IMS. In: Proceedings - International Conference on Availability,
Reliability and Security, ARES 2009, pp. 865-869. (2009)
AN
37. Guel, M.D.: A Framework for Choosing Your Next Generation
Authentication/Authorization System. Information Security Technical Report 7, 63-78
(2002)
38. Palmer, A.J.: Approach for selecting the most suitable Automated Personal Identification
M
42. Forget, A., Chiasson, S., Biddle, R.: User-centred authentication feature framework.
Information and Computer Security 23, 497-515 (2015)
43. Nag, A.K., Dasgupta, D., Deb, K.: An adaptive approach for active multi-factor
authentication. In: 9th Annual Symposium on Information Assurance (ASIA’14), pp. 39.
CE
(2014)
44. Nag, A.K., Dasgupta, D.: An adaptive approach for continuous multi-factor authentication
in an identity eco-system. In: ACM International Conference Proceeding Series, pp. 65-68.
(2014)
AC
48. Bruun, A., Jensen, K., Kristensen, D.: Usability of single-and multi-factor authentication
methods on tabletops: A comparative study. Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 8742, pp. 299-306 (2014)
49. Anwar, M., Imran, A.: A comparative study of graphical and alphanumeric passwords for
mobile device authentication. In: CEUR Workshop Proceedings, pp. 13-18. (2015)
T
IP
CR
US
AN
M
ED
PT
CE
AC