1. Dhamija, R., & Perrig, A. (2000). Déjà vu: A user study using images for authentication. In Proceedings of the 9th conference on USENIX Security Symposium (Vol. 9, pp. 1-15).
2. Thorpe, J., & Thorpe, M. (2008). Graphical passwords: A survey of usability issues. In Proceedings of the Fourth Symposium on Usable Privacy and Security (SOUPS 2008) (pp. 1-12).
3. Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., & Memon, N. (2005). Authentication using graphical passwords: Effects of tolerance and image choice. In Proceedings of the 2005 symposium on Usable privacy and security (pp. 1-12).
4. Vishwanath, A., & Dhamija, R. (2007). PassPoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 65(12), 965-984.
5. Monrose, F., & Reiter, M. K. (1999). Memorability and security: risk assessment of graphical passwords. In International Workshop on Security Protocols (pp. 1-15). Springer, Berlin, Heidelberg.