J. Angulo and E. Wästlund, Exploring Touch-Screen Biometrics for User Identification on Smart Phones, Privacy and Identity 2011, IFIP AICT 375, pp.130-143, 2012.
DOI : 10.1007/978-3-642-31668-5_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Blonder, Graphical Passwords. United States Paten 5559961, 1996.

S. Chiasson, R. Biddle, and P. C. Van-oorschot, A second look at the usability of click-based graphical passwords, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.1-12, 2007.
DOI : 10.1145/1280680.1280682

S. Chiasson, P. C. Van-oorschot, and R. Biddle, Graphical Password Authentication Using Cued Click Points, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS), pp.359-374, 2007.
DOI : 10.1007/978-3-540-74835-9_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Luca, A. Hang, A. Brudy, F. Lindner, C. Hussmann et al., Touch Me Once and I Know It's You!: Implicit Authentication based on Touch Screen Patterns, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI), pp.987-996, 2012.

D. Davis, F. Monrose, and M. K. Reiter, On User Choice in Graphical Password Schemes, Proceedings of the 13th Conference on USENIX Security Symposium (SSYM), pp.151-164, 2004.

A. E. Dirik, N. Memon, and J. Birget, Modeling user choice in the PassPoints graphical password scheme, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.20-28, 2007.
DOI : 10.1145/1280680.1280684

P. Dunphy, A. P. Heiner, and N. Asokan, A closer look at recognition-based graphical passwords on mobile devices, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pp.1-12, 2010.
DOI : 10.1145/1837110.1837114

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Go?ofit, Click Passwords Under Investigation, Proceedings of the 12th European symposium on Research in Computer Security (ESORICS), pp.343-358, 2007.
DOI : 10.1007/978-3-540-74835-9_23

I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, The Design and Analysis of Graphical Passwords, Proceedings of the 8th Conference on USENIX Security Symposium (SSYM), pp.1-14, 1999.

A. K. Karlson, A. B. Brush, and S. Schechter, Can i borrow your phone?, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.1647-1650, 2009.
DOI : 10.1145/1518701.1518953

D. Kim, P. Dunphy, P. Briggs, J. Hook, J. W. Nicholson et al., Multi-touch authentication on tabletops, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1093-1102, 2010.
DOI : 10.1145/1753326.1753489

D. Lin, P. Dunphy, P. Olivier, and J. Yan, Graphical passwords & qualitative spatial relations, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.161-162, 2007.
DOI : 10.1145/1280680.1280708

Y. Meng, Designing Click-Draw Based Graphical Password Scheme for Better Authentication, 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage, pp.39-48, 2012.
DOI : 10.1109/NAS.2012.9

Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok, Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones, Proceedings of the 8th China International Conference on Information Security and Cryptology (INSCRYPT), pp.331-350, 2012.
DOI : 10.1007/978-3-642-38519-3_21

M. Media, Mobile mix: The mobile device index, 2012.

D. L. Nelson, V. S. Reed, and J. R. Walling, Pictorial superiority effect., Journal of Experimental Psychology: Human Learning & Memory, vol.2, issue.5, pp.523-528, 1976.
DOI : 10.1037/0278-7393.2.5.523

I. Oakley and A. Bianchi, Multi-touch passwords for mobile device access, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.611-612, 2012.
DOI : 10.1145/2370216.2370329

R. N. Shepard, Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, vol.6, issue.1, pp.156-163, 1967.
DOI : 10.1016/S0022-5371(67)80067-7

X. Suo, Y. Zhu, and G. S. Owen, Graphical Passwords: A Survey, Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp.463-472, 2005.

S. Trewin, C. Swart, L. Koved, J. Martino, K. Singh et al., Biometric authentication on a mobile device, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.159-168, 2012.
DOI : 10.1145/2420950.2420976

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.102-127, 2005.
DOI : 10.1016/j.ijhcs.2005.04.010

Y. Zhang, P. Xia, J. Luo, Z. Ling, B. Liu et al., Fingerprint attack against touch-enabled devices, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.57-68, 2012.
DOI : 10.1145/2381934.2381947

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=