1. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, WOOT 2010, pp. 1–7. USENIX Association, Berkeley (2010)
2. Biddle, R., Chiasson, S., van Oorschot, P.: Graphical passwords: Learning from the first twelve years. Technical report TR-11-01, School of Computer Science, Carleton University (January 2011)
3. Breiman, L.: Random forests. Machine Learning 45(1), 5–32 (2001)
4. Brubeck, M., Schepers, D., Moon, S.: Touch events version 1 - w3c working draft (September 13, 2011),
http://www.w3.org/TR/2011/WD-touch-events-20110913/
(accessed October 27, 2011)
5. Chairunnanda, P., Pham, N., Hengartner, U.: Privacy: Gone with the Typing! Identifying Web Users by Their Typing Pattern. In: 4th Hot Topics in Privacy Enhancing Technologies (HotPETs). The 11th Privacy Enhancing Technologies Symposium. Springer, Waterloo (2011)