1. Smudge attacks on smartphone touch screens;Aviv,2010
2. Person authentication by voice: a need for Caution;Bonastre,2003
3. The password Thicket: technical and market failures in human authentication on the web;Bonneau,2010
4. A birthday present every eleven wallets? The security of customer-chosen banking PINs;Bonneau,2012
5. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes;Bonneau,2012