1. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp 1–7. USENIX Association, Berkeley (2010).
http://dl.acm.org/citation.cfm?id=1925004.1925009
2. Banyal, R.K., Jain, P., Jain, V.K.: Multi-factor authentication framework for cloud computing. In: Proceedings of the Fifth International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), Seoul, Korea, 24–25 September 2013, pp. 105–110 (2013)
3. Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behavior in organizations. In: Proceedings of the Workshop on New Security Paradigms, pp. 47–58 (2010).
https://doi.org/10.1145/1595676.1595684
4. Lecture Notes in Computer Science;M Belk,2013
5. Clarke, R.: Sufficiently Rich Model of (id)Entity, Authentication and Authorization (2010).
http://www.rogerclarke.com/ID/IdModel1002.html#MAc