1. Transforming the weakest link a human/computer interaction approach to usable and effective security;Sasse;BT Technol. J.,2001
2. J. Nielsen, Security and human factors, Alertbox (November 2000) http://www.useit.com/alertbox/20001126.html (2000).
3. Usability and acceptability of biometric security systems;Patrick,2004
4. L. Coventry, A. De Angeli, G. Johnson, Usability and Biometric Verification at the ATM Interface, New York: ACM press, pp. 153–160.
5. FIRME: face and iris recognition for mobile engagement;De Marsico;Image Vis. Comput.,2014