1. IPAS: Implicit Password Authentication System
2. Dirik, A. E., Memon, N., & Birget, J. C. (2007, July). Modeling user choice in the PassPoints graphical password scheme. Proceedings of the 3rd symposium on Usable privacy and security (pp. 20-28). Pittsburgh, PA: ACM.
3. Yang, Z., Huang, Y., Li, X., Wang, W., Wu, F., Zhang, X., ... & Li, W. (2018). Efficient, secure data provenance scheme in multimedia outsourcing and sharing.Computers, Materials, & Continua, 56(1), 1–17.
4. Geir, M. K. (2013, October). Privacy enhanced mutual authentication in LTE. Proceedings 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 614-621). IEEE.
5. Birget, J. C., Hong, D., & Memon, N. (2006). Graphical passwords based on robust discretization, Information Forensics and Security. IEEE Transactions, 1(3), 395–399.