L. Catuogno and C. Galdi, A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices, 2nd Workshop on Information Security Theory and Practices (WISTP 08, 2008.
DOI : 10.1073/pnas.95.5.2703

X. Suo, Y. Zhu, and G. S. Owen, Graphical passwords: a survey, Proceedings of 21st Annual Computer Security Application Conference (ACSAC 2005) december 5-9, pp.463-472, 2005.

P. Golle and D. Wagner, Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract), 2007 IEEE Symposium on Security and Privacy (SP '07), pp.66-70, 2007.
DOI : 10.1109/SP.2007.13

C. Thiffault, F. Bacchus, and T. Walsh, Solving Non-clausal Formulas with DPLL Search, Lecture Notes in Computer Science, vol.3258, pp.663-678, 2004.
DOI : 10.1007/978-3-540-30201-8_48

H. Jain, C. Bartzis, and E. M. Clarke, Satisfiability Checking of Non-clausal Formulas Using General Matings, Lecture Notes in Computer Science, vol.4121, pp.75-89, 2006.
DOI : 10.1007/11814948_10

A. Juels and S. A. Weis, Authenticating Pervasive Devices with Human Protocols, Proceedings of 25th International Cryptology Conference, pp.293-308, 2005.
DOI : 10.1007/11535218_18