References
- Adams, A.; Sasse, M. A.: Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures, Communications of the ACM, 42, 1999, 41–46.
- Anderson, R. J.: Why Cryptosystems Fail, Communications of the ACM, 37, 1994, 32–40.
- Davis, D.; Monrose, F.; Reiter, M. K.: On user choice in graphical password schemes, in Proceedings of the 13th Usenix Security Symposium, San Diego, CA, 2004.
- Department of Defense Computer Security Center: Department of Defense Password Management Guideline, Department of Defense, Washington, DC, CSC–STD–002–85, April 12, 1985.
- Doyle, P.; Hanna, S.: Analysis of June 2003 Survey on Obstacles to PKI Deployment and Usage, Organization for the Advancement of Structured Information Standards, Billerica, MA, August 8, 2003.
- Jermyn, I.; Mayer, A.; Monrose, F.; Reiter, M. K.; Rubin, A. D.: The Design and Analysis of Graphical Passwords, in Proceedings of the 8th USENIX Security Symposium, 1999.
- Shepard, R. N.: Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, 6, 1967, 156–163.
- Syukri, A. F.; Okamoto, E.; Mambo, M. A.: User Identification System Using Signature Written with Mouse, in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1438), 1998, 403–441.
- Thomas, R. C.; Karahasanovic, A.; Kennedy, G. E.: An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, presented at Australasian Computing Education Conference 2005, Newcastle, Australia, 2005.
- Thorpe, J.; Oorschot, P. C. V.: Graphical Dictionaries and the Memorable Space of Graphical Passwords, in Proceedings of the 13th USENIX Security Symposium, San Deigo, USA: USENIX, 2004.
- Van Oorschot, P. C.; Thorpe, J.: On Predictive Models and User-Drawn Graphical Passwords, ACM Transactions on Information and System Security, 10(4), Article 17, 2008, 1–33
- Whitten, A.; Tygar, J. D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0, presented at 8th Usenix Security Symposium, Washington, DC, 1999.
- Wolff, W.: Diagrams of the unconscious; handwriting and personality in measurement, experiment and analysis New York, Grune & Stratton, 1948.
- Yan, J.; Blackwell, A.; Anderson, R.; Grant, A.: Password Memorability and Security: Empirical Results, IEEE Privacy & Security, 2, 2004, 25–31.
- Zhu, X.; Suo, Y.; Owen, G. S.: Graphical Passwords: A Survey In proceedings of ACSAC, IEEE Computer Society, 2005, 463–472.