1. Camera Based Two Factor Authentication Through Mobile and Wearable Devices
2. Daniel V Bailey , Markus Dürmuth , and Christof Paar . 2014 . “ Typing” passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer , Citeseer, CA, USA, 1–2. Daniel V Bailey, Markus Dürmuth, and Christof Paar. 2014. “Typing” passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer, Citeseer, CA, USA, 1–2.
3. John Brooke . 1996. Sus: a “quick and dirty’usability. Usability evaluation in industry 189, 3 ( 1996 ), 189–194. John Brooke. 1996. Sus: a “quick and dirty’usability. Usability evaluation in industry 189, 3 (1996), 189–194.
4. Are Passfaces More Usable Than Passwords? A Field Trial Investigation
5. Darren Davis , Fabian Monrose , and Michael K Reiter . 2004. On user choice in graphical password schemes .. In USENIX security symposium, Vol. 13 . USENIX Association , USA , 11–11. Darren Davis, Fabian Monrose, and Michael K Reiter. 2004. On user choice in graphical password schemes.. In USENIX security symposium, Vol. 13. USENIX Association, USA, 11–11.