1. McCaughrean, G.: One Thousand and One Arabian Nights, USA. Oxford University Press, Oxford (1999)
2. Adams, M.A., Sasse, M.S.: Users are not the enemy: why users compromise computing security mechanisms and how to take remedial measure. Communications of the ACM 42(12), 40–46 (1999)
3. RSA Security Inc. RSA SecurID® authenticators,
http://www.rsasecurity.com
4. Suo, X., Owen, Y.Z.: Graphical Passwords: A Survey. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 463–472 (2005)
5. Gilhooly, K.: Biometrics: Getting Back to Business. Computerworld (May 09, 2005)