“…The passwords used to be (Loch et al, 1992;Tzong-Chen and Hung-Sung, 1996;Zviran and Haga, 1990) and still are the main method of authentication (Creese et al, 2013;Egelman et al, 2013;Lee et al, 2013), although research continues on more sophisticated methods of authentication, see e.g. Al-Hudhud et al (2014), Hölbl et al (2008Hölbl et al ( , 2010Hölbl et al ( , 2012, Jiang et al (2013), Kuo et al (2006), Liaojun et al (2013). Some novel solutions are even improvements of concepts well known to the automobile industry (i.e.…”