1. Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C.: A survey of continuous and transparent multibiometric authentication systems. In: European Conference on Cyber Warfare and Security, pp. 1–10 (2015)
2. Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. Woot 10, 1–7 (2010)
3. Becker, C., Rigamonti, R., Lepetit, V., Fua, P.: Supervised feature learning for curvilinear structure segmentation. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 526–533. Springer (2013)
4. Bhargav-Spantzel, A., Squicciarini, A.C., Modi, S., Young, M., Bertino, E., Elliott, S.J.: Privacy preserving multi-factor authentication with biometrics. J. Comput. Secur. 15(5), 529–560 (2007)
5. Bombardini, T., Gemignani, V., Bianchini, E., Venneri, L., Petersen, C., Pasanisi, E., Pratali, L., Alonso-Rodriguez, D., Pianelli, M., Faita, F., et al.: Diastolic time–frequency relation in the stress echo lab: filling timing and flow at different heart rates. Cardiovasc. Ultrasound 6(1), 15 (2008)