1. Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures;Adams;Commun ACM,1999
2. A pilot study on the security of pattern screen-lock methods and soft side channel attacks;Andriotis,2013
3. Exploring touch-screen biometrics for user identification on smart phones;Angulo,2012
4. Cryptoanalysis of the convex hull click human identification protocol;Asghar,2011
5. Smudge attacks on smartphone touch screens;Aviv,2010