A. Adams and M. A. Sasse, Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999.
DOI : 10.1145/322796.322806

C. Delogu, D. Carlo, A. Rotundi, P. Sartori, and D. , Usability Evaluation of IVR Systems with DTMF and ASR, Proc. of ICSLP'98, 1998.

J. L. Dugelay, J. C. Junqua, C. Kotropoulos, R. Kuhn, F. Perronnin et al., Recent advances in biometric person authentication, IEEE International Conference on Acoustics Speech and Signal Processing, pp.4060-4063, 2002.
DOI : 10.1109/ICASSP.2002.5745549

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.2173

F. Consulting, Enhancing Authentication to Secure the Open Enterprise, Whitepaper commissioned by VerySign (Symantec), 2010.

A. K. Jain, A. Ross, and S. Prabhakar, An Introduction to Biometric Recognition IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image-and Video- Based Biometrics, 2004.

A. Lerer, M. Ward, and S. Amarasinghe, Evaluation of IVR data collection UIs for untrained rural users, Proceedings of the First ACM Symposium on Computing for Development, ACM DEV '10, pp.1-28, 2010.
DOI : 10.1145/1926180.1926183

M. Mannan, D. Barrera, C. Brown, D. Lie, and P. Van-oorschot, Mercury: Recovering Forgotten Passwords Using Personal Devices. Financial Cryptography and Data Security, pp.315-330, 2012.
DOI : 10.1007/978-3-642-27576-0_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.546

A. P. Pons and P. Polak, Understanding user perspectives on biometric technology, Communications of the ACM, vol.51, issue.9, pp.115-118, 2008.
DOI : 10.1145/1378727.1389971

A. Rabkin, Personal knowledge questions for fallback authentication, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.13-23, 2008.
DOI : 10.1145/1408664.1408667

H. M. Wood, The use of passwords for controlling access to remote computer systems and services, Proceedings of the June 13-16, 1977, national computer conference on, AFIPS '77, pp.27-33, 1977.
DOI : 10.1145/1499402.1499410