@incollection{, 591DCEE814D286A5BF8A376C86B1F5C8 , author={{Dr. Priyanka V.Kampasi} and {Prof. Y.C.Kulkarni} and {Bharati Vidyapeethas College of Engineering/IT, Pune, India.}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}121514 } @book{b0, , title={{Factor Authentication Using Mobile Phones Fadi Aloul, Syed Zahidi}} , publisher={Wassim El-Hajj} } @book{b1, , title={{Towards Ubiquitous Computing via Secure Desktop Service Pan-Lung Tsai, Student Member}} , publisher={IEEE} , address={Lei, Member, IEEE} } @incollection{b2, , title={{Payments and Banking with Mobile Personal Devices}} , author={{ AHerzberg }} , journal={{Communications of the ACM}} 46 5 , year={May 2008} } @book{b3, , title={{Fourth Factor Authentication}} , author={{ JBrainard } and { AJuels } and { RLRivest }} , year={2010} , publisher={ACM CCS} } @book{b4, , title={{NIST's Policy on Hash Functions}} , year={March 29, 2009} National Institute on Standards and Technology Computer Security Resource Center } @incollection{b5, , title={{}} , author={{ NielsFerguson } and { BruceSchneier } and { TadayoshiKohno }} , journal={{Cryptography Engineering}} , year={2010} , publisher={John Wiley & Sons} } @incollection{b6, , title={{Security in Mobile Communications: Challenges and Opportunities}} , author={{ AJosang } and { GSanderud }} , booktitle={{Proc. of the Australian information security workshop conderence on sACSW frontiers}} of the Australian information security workshop conderence on sACSW frontiers , year={2003} }