[1]
B. Morrow, BYOD security challenges: control and protect your most sensitive data, Network Security, vol. 2012, pp.5-8, (2012).
DOI: 10.1016/s1353-4858(12)70111-3
Google Scholar
[2]
S. Holtmanns, V. Niemi, P. Ginzboorg, P. Laitinen, and N. Asokan, Cellular Authentication for Mobile and Internet Services: Wiley. com, (2008).
DOI: 10.1002/9780470771013
Google Scholar
[3]
A. Kemshall, Why mobile two-factor authentication makes sense, Network Security, vol. 2011, pp.9-12, (2011).
DOI: 10.1016/s1353-4858(11)70038-1
Google Scholar
[4]
A. Scarfo, New Security Perspectives around BYOD,, 2012, pp.446-451.
Google Scholar
[5]
G. Yang and F. Zhou, Trusted Computing-Based Double Factor Authentication for Mobile Terminals,, 2010, pp.683-685.
DOI: 10.1109/iptc.2010.104
Google Scholar
[6]
J. Hu, C. Sueng, W. Liao, and C. C. Ho, Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking,, Hong Kong, China, 2012, pp.111-116.
DOI: 10.1109/comcomap.2012.6154013
Google Scholar
[7]
B.A.P. Botelho, D.G.A.E. Pelluzi and E.T. Nakamura, A versatile access control implementation: secure box,, 2013, pp.249-252.
DOI: 10.1145/2462410.2463208
Google Scholar
[8]
T. Kuseler, I. A. Lami and H. Al-Assam, Location-assured, multifactor authentication on smartphones via LTE communication,, 2013, p. 87550B-87550B.
DOI: 10.1117/12.2018027
Google Scholar
[9]
S. Furnell, N. Clarke and S. Karatzouni, Beyond the pin: Enhancing user authentication for mobile devices, Computer fraud \& security, vol. 2008, pp.12-17, (2008).
DOI: 10.1016/s1361-3723(08)70127-1
Google Scholar
[10]
B. Arkin, The case for mobile two-factor authentication, IEEE Security \& Privacy, (2011).
Google Scholar