A. A. Ahmed and I. Traore, Darpa seeks authentication beyond passwords

K. D. Vere, Drawbridge exits closed beta, unveils crossscreen mobile marketing solutions Available: http://www.insidemobileapps.comdrawbridge- exits-closed-beta-unveils-cross-screen-mobile-marketing- solutions, 2012.

P. Eckersley, How Unique Is Your Web Browser?, Privacy Enhancing Technologies, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting information in javascript implementations, Proceedings of W2SP 2011, 2011.

T. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, Host fingerprinting and tracking on the web:privacy and security implications, 19th Annual Network and Distributed System Security Symposium (NDSS) 2012, Internet Society, 2012.

R. Moskovitch, C. Feher, A. Messerman, N. Kirschnick, T. Mustafic et al., Identity theft, computers and behavioral biometrics, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.155-160, 2009.
DOI : 10.1109/ISI.2009.5137288

B. Miller, Vital signs of identity [biometrics], IEEE Spectrum, vol.31, issue.2, pp.22-30, 1994.
DOI : 10.1109/6.259484

R. V. Yampolskiy and V. Govindaraju, Behavioural biometrics: a survey and classification, International Journal of Biometrics, vol.1, issue.1, pp.81-113, 2008.
DOI : 10.1504/IJBM.2008.018665

C. Shen, Z. Cai, X. Guan, H. Sha, and J. Du, Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring, 2009 IEEE International Conference on Communications, pp.673-677, 2009.
DOI : 10.1109/ICC.2009.5199032

R. Moskovitch, C. Feher, A. Messerman, N. Kirschnick, T. Mustafic et al., Identity theft, computers and behavioral biometrics, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.155-160, 2009.
DOI : 10.1109/ISI.2009.5137288

M. Pusara and C. E. Brodley, User re-authentication via mouse movements Visualization and data mining for computer security, ser. VizSEC/DMSEC '04, Proceedings of the 2004 ACM workshop on, pp.1-8, 2004.

F. Monrose and A. Rubin, Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.48-56, 1997.
DOI : 10.1145/266420.266434

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.1197

S. Giroux, R. Wachowiak-smolikova, and M. P. Wachowiak, Keystroke-based authentication by key press intervals as a complementary behavioral biometric, 2009 IEEE International Conference on Systems, Man and Cybernetics, pp.80-85, 2009.
DOI : 10.1109/ICSMC.2009.5346319

N. Zheng, A. Paloski, and H. Wang, An efficient user verification system via mouse movements Automatic on-line signature verification, Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11 Proceedings of the IEEE, pp.139-150, 1997.

S. Pankanti, S. Prabhakar, and A. K. Jain, On the individuality of fingerprints, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.8, pp.1010-1025, 2002.
DOI : 10.1109/TPAMI.2002.1023799

L. V. Ahn, M. Blum, N. J. Hopper, and J. Langford, CAPTCHA: Using Hard AI Problems for Security, Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, ser. EUROCRYPT'03, pp.294-311, 2003.
DOI : 10.1007/3-540-39200-9_18

A. Rice, A Continued Commitment to Security, 2011.

N. L. Clarke and S. M. , Authentication of users on mobile telephones ??? A survey of attitudes and practices, Computers & Security, vol.24, issue.7, pp.519-527, 2005.
DOI : 10.1016/j.cose.2005.08.003

S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric recognition: security and privacy concerns, IEEE Security & Privacy Magazine, vol.1, issue.2, pp.33-42, 2003.
DOI : 10.1109/MSECP.2003.1193209

A. Janc and L. Olejnik, What the internet knows about you

L. Olejnik, C. Castelluccia, and A. Janc, Why johnny can't browse in peace: On the uniqueness of web browsing history patterns, HotPETS, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00747841

A. Janc and L. Olejnik, Web Browser History Detection as a Real-World Privacy Threat, ESORICS, pp.215-231, 2010.
DOI : 10.1007/978-3-642-15497-3_14

E. W. Felten and M. A. Schneider, Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.25-32, 2000.
DOI : 10.1145/352600.352606

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.6864

M. Zalewski, Rapid history extraction through nondestructive cache timing (v8), 2011.

L. D. Baron, Preventing attacks on a user's history through css :visited selectors, 2010.

P. D. Ryck, L. Desmet, T. Heyman, F. Piessens, and W. Joosen, Csfire: Transparent client-side mitigation of malicious cross-domain requests, ESSoS, pp.18-34, 2010.

A. A. Ahmed and I. Traore, European standard en50133-1: Alarm systems. access control systems for use in security applications. part 1: System requirements, 2002.