L. G. De-rodrigo, A. L. Carlos, and A. Atman, Biometric identification systems, J]. Signal Processing, issue.12, pp.83-2539, 2003.

J. A. Halderman, B. Waters, and E. W. Felten, A convenient method for securely man-aging passwords, Proceedings of the 14th international conference on World Wide Web, pp.471-479, 2005.

G. Shirley and W. Edword, Password management strategies for online ac-counts[C]. Proceedings of the second symposium on Usable privacy and security, pp.44-55, 2006.

B. Pinkas and T. Sander, Securing passwords against dictionary attacks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.161-170, 2002.
DOI : 10.1145/586110.586133

J. Zhang, X. Luo, and S. Akkaladevi, Improving multiple-password recall: an empirical study, European Journal of Information Systems, vol.17, issue.1, pp.165-176, 2009.
DOI : 10.1109/MSP.2004.81

G. Notoatmodjo and C. Thomborson, Passwords and perceptions, Proceedings of the 7th Australasian Conference on Information Security, pp.71-78, 2009.

S. M. Devi and M. Geetha, OPass: Attractive presentation of user authentication protocol with resist to password reuse attacks, International Journal of Computer Science and Mobile Computing, vol.8, issue.2, pp.174-180, 2013.

B. Ives, K. R. Walsh, and H. Schneider, The domino effect of password reuse, Communications of the ACM, vol.47, issue.4, pp.75-78, 2004.
DOI : 10.1145/975817.975820

. B. Schneier, Real-world passwords, 2006.

C. Yang, J. Hung, and Z. Lin, An analysis view on password patterns of Chinese internet users, Nankai Business Review International, vol.4, issue.1, pp.66-77, 2013.
DOI : 10.1108/20408741311303887

D. Florencio and C. Herley, A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.657-666, 2007.
DOI : 10.1145/1242572.1242661

A. S. Brown, E. Bracken, and S. Zoccoli, Generating and remembering pass-words, Applied Cognitive Psychology, issue.6, pp.18-641, 2004.

Y. Bang, D. J. Lee, and Y. S. Bae, Improving information security management: An analysis of ID???password usage and a new login vulnerability measure, International Journal of Information Management, vol.32, issue.5, pp.32-409, 2012.
DOI : 10.1016/j.ijinfomgt.2012.01.001

M. A. Sasse, S. Brostoff, and D. Weirich, Transforming the 'Weakest Link' - a Human-Computer Interaction Approach to Usable and Effective security, BT Technology Journal, issue.319, pp.122-131, 2001.
DOI : 10.1049/PBBT004E_ch15

J. E. Lisman and M. A. Idiart, Storage of 7 +/- 2 short-term memories in oscillatory subcycles, Science, vol.267, issue.5203, pp.267-1512, 1995.
DOI : 10.1126/science.7878473