1. Lecture Notes in Computer Science, 2248;Hopper N.,2000
2. [ 3 ] D. Weinshall . Cognitive authentication schemes safe against spyware . IEEE Symposium on Security and Privacy (S&P) , 2006 . [3] D. Weinshall. Cognitive authentication schemes safe against spyware. IEEE Symposium on Security and Privacy (S&P), 2006.
3. A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm;Asghar H. J.;Applied Cryptography and Network Security,2010
4. [ 6 ] J. Blocki , M. Blum , A. Datta ., S. Vempala . Toward human computable passwords .. ITCS 2017 . [6] J. Blocki, M. Blum, A. Datta., S. Vempala. Toward human computable passwords.. ITCS 2017.
5. Publishable humanly usable secure password creation schemas.AAAI Conference on Human Computation and Crowdsourcing;Blum M.;HCOMP,2015