. A Shoulder Surfing Resistant Graphical Authentication System,Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh and Chia-Yun Cheng,2016
. Bin B.Zhu, Jeff Yan,Gunabo Bao,Maowei Yangand Ning Xu, â€œCaptcha as Graphical Password-A new Security Approach Based on Hard AI Problems", IEEE,June 2014.
. David Kim, Paul Dunphy, and Pam Briggs, â€œA Shoulder Surfing Resistant Visual Authentication Scheme,â€ (Volume:PP , Issue: 99 ), April 10-15, 2010.
. R.Biddle, S. Chiasson, and P. C. van Oorschot, â€œGraphical passwords: Learning from the first twelve years,â€ ACM Comput. Surveys, vol. 44, no. 4, 2012.
. R. Dhamija and A. Perrig, â€œDeja vu: A user study using images for authentication,â€ in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4â€“4.
. J. Long and K. Mitnick, No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Elsevier Science, 2011.
. T. Kwon, S. Shin, and S. Na, â€œCovert attentional shoulder surfing: Human adversaries are more powerful than expected,â€ IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 6,pp. 716â€“727, June 2014.
. B. Hartanto, B. Santoso, and S. Welly, â€œThe usage of graphical password as a replacement to the alphanumerical password,â€ Informatika, vol. 7, no. 2, 2006, pp. 91-97.
. S. Man, D. Hong, and M. Mathews, â€œA shoulder surfing resistant graphical password scheme,â€ Proc. of the 2003 Int.Conf. on Security and Management, June 2003, pp. 105-111 .
. â€œRealuser,â€ http://www.realuser.com/.
. Z. Zheng, X. Liu, L. Yin, and Z. Liu, â€œA stroke-based textual password authentication scheme,â€ Proc. of the FirstInt. Workshop.on Education Technology and ComputerScience, Mar. 2009, pp. 90-95.
. T. Yamamoto, Y. Kojima, and M. Nishigaki, â€œA shoulder surfing-resistant image-based authentication system with temporal indirect image selection,â€ Proc. of the 2009 Int.Conf. on Security and Management, July 2009, pp. 188- 194.
. H. Zhao and X. Li, â€œS3PAS: A scalable shoulder -surfing resistant textual-graphical password authentication scheme,â€ Proc. of 21st Int. Conf. on Advanced InformationNetworking and Applications Workshops, vol. 2, May 2007, pp. 467-472.
. AA. Paivio, T. Rogers, and P. Smythe, â€œWhy are pictures easier to recall than words?â€ Psychonomic Science, 1968.
. D. Nelson, U. Reed, and J. Walling, â€œPicture superiority effect,â€ Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485â€“497, 1977.
. S. H. Kim, J. W. Kim, S. Y. Kim, and H.G. Cho. â€œA new shoulder-surfing resistant password for mobile environments,â€ Proc. of 5th Int. Conf. on Ubiquitous Information Management and Communication, Feb. 2011.
.S. Sood, A. Sarje, and K. Singh, â€œCryptanalysis of password authentication schemes: Current status and key issues,â€ in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 1â€“7.