1. Alan, D., Finaly, J., Abowd, G.D., Russel, B.: Human Computer Interaction. Pearson Prentice Hall, Upper Saddle River (2004)
2. Awais, A., Muhammad, A., Kashif, H.M., Ramzan, T.: Secure graphical password techniques against shoulder surfing and camera based attacks. In: International Journal of Computer Network and Information Security, November 2016, pp. 11–18. IEEE (2016)
3. Commission, U.F.T., et al.: Consumer sentinel network data book for January-December 2014 (2015)
4. Drewes, F., Du Toit, C., Ewert, S., Van Der Merwe, B., Van Der Walt, A.P.: Bag context tree grammars. In: Developments in Language Theory, pp. 226–237. Springer (2006)
5. Haichang, G., Xiyang, L., Sidong, W., Honggang, L., Ruyi, D.: Design and analysis of a graphical password scheme. In: Fourth International Conference on Innovative Computing, Information and Control, pp. 675–678. IEEE (2009)