A. Brostoff, Improving password system effectiveness, 2004.

N. M. Duc and B. Q. Minh, Your face is not your password -face authentication bypassing lenovo -asus -toshiba, 2009.

A. M. Eljetlawi and N. Ithnin, Graphical Password: Comprehensive Study of the Usability Features of the Recognition Base Graphical Password Methods, 2008 Third International Conference on Convergence and Hybrid Information Technology, pp.1137-1143, 2008.
DOI : 10.1109/ICCIT.2008.20

X. Suo, Y. Zhu, and G. S. Owen, Graphical passwords: a survey, 21st Annual Conf. on Computer Security Applications. (2005) 10 pp.+

I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, The design and analysis of graphical passwords, SSYM'99: Proc. of the 8th conf. on USENIX Security Symposium, pp.1-1, 1999.

S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, Authentication using graphical passwords, Proceedings of the 2005 symposium on Usable privacy and security , SOUPS '05, pp.1-12, 2005.
DOI : 10.1145/1073001.1073002

Z. Li, Q. Sun, Y. Lian, and D. Giusto, An association-based graphical password design resistant to shoulder-surfing attack, IEEE Int. Conf. on Multimedia and Expo, pp.245-248, 2005.

J. Thorpe and P. C. Van-oorschot, Towards Secure Design Choices for Implementing Graphical Passwords, 20th Annual Computer Security Applications Conference, pp.50-60, 2004.
DOI : 10.1109/CSAC.2004.44

S. Brostoff and M. A. Sasse, Are Passfaces More Usable Than Passwords? A Field Trial Investigation, Proc. of HCI, 2000.
DOI : 10.1007/978-1-4471-0515-2_27

R. Dhamija and A. Perrig, Déjà vu: A user study using images for authentication, Proc. 9th USENIX Security Symposium, pp.45-58, 2000.

T. Takada and H. Koike, Awase-E: Image-Based Authentication for Mobile Phones Using User???s Favorite Images, Proc. of the 5th Int. Symposium on Human- Computer Interaction with Mobile Devices and Services, pp.347-351, 2003.
DOI : 10.1007/978-3-540-45233-1_26

S. Li and H. Y. Shum, Secure human-computer identification (interface) systems against peeping attacks: SecHCI. Cryptology ePrint Archive, Report, vol.268, 2005.

G. Rizzolatti and C. Sinigaglia, Mirrors in the brain: How our minds share actions and emotions, 2006.

H. Breuer, Empathie ? Streit um das soziale Hirn, Süddeutsche Zeitung, p.16, 2010.

M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa, Towards Automating Social Engineering Using Social Networking Sites, 2009 International Conference on Computational Science and Engineering, pp.117-124, 2009.
DOI : 10.1109/CSE.2009.205

E. Arnaud, B. Fauvet, E. Memin, and P. Bouthemy, A robust and automatic face tracker dedicated to broadcast videos, IEEE International Conference on Image Processing 2005, 2005.
DOI : 10.1109/ICIP.2005.1530420

URL : https://hal.archives-ouvertes.fr/inria-00306721

K. An, D. Yoo, and M. Chung, An efficient fully automatic face tracking using binary template matching, Proc. of The Ninth Int. Symposium on Artificial Life and Robotics, pp.37-40, 2004.

C. H. Chen, Handbook of pattern recognition and computer vision, 2005.

C. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

J. Yan, A. Blackwell, R. Anderson, and A. Grant, The memorability and security of passwords -some empirical results, 2000.