1. Dhamija, R., Perrig, A.: Deja Vu-a user study: using images for authentication. In: USENIX Security Symposium, 14 August 2000, vol. 9, p. 4 (2000)
2. Jablon, D.P.: Extended password key exchange protocols immune to dictionary attacks (1997)
3. Pliam, J.O.: On the incomparability of entropy and marginal guesswork in brute-force attacks. In: International Conference on Cryptology in India, pp. 67–79. Springer, Heidelberg (2000)
4. Avoine, G., Bourgeois, A., Carpent, X.: Fingerprint tables: a generalization of rainbow table (2013)
5. Yan, J., Blackwell, A.: Password memorability and security: empirical results (2004)