Abstract: Traditional password-based authentication methods confront several issues such as security weaknesses, user inconvenience, and susceptibility to various attacks, e.g. phishing. These issues ...