A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, Smudge attacks on smartphone touch screens, Proceedings of the 4th USENIX conference on Offensive technologies. pp. 1?7. WOOT'10, USENIX Association, 2010.

R. Biddle, S. Chiasson, and P. Van-oorschot, Graphical passwords, ACM Computing Surveys, vol.44, issue.4, 2011.
DOI : 10.1145/2333112.2333114

L. Breiman, Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.
DOI : 10.1023/A:1010933404324

M. Brubeck, D. Schepers, and S. Moon, Touch events version 1 -w3c working draft 13 september, pp.2011-2021, 2011.

P. Chairunnanda, N. Pham, and U. Hengartner, Privacy: Gone with the Typing! Identifying Web Users by Their Typing Pattern In: 4th Hot Topics in Privacy Enhancing Technologies (HotPETs). The 11th Privacy Enhancing Technologies Symposium, 2011.

N. L. Clarke and S. Furnell, Authentication of users on mobile telephones ??? A survey of attitudes and practices, Computers & Security, vol.24, issue.7, pp.519-527, 2005.
DOI : 10.1016/j.cose.2005.08.003

N. L. Clarke and S. Furnell, Authenticating mobile phone users using keystroke analysis, International Journal of Information Security, vol.23, issue.5, pp.1-14, 2007.
DOI : 10.1007/s10207-006-0006-6

N. L. Clarke, S. Karatzouni, and S. Furnell, Flexible and Transparent User Authentication for Mobile Devices, In: SEC. pp, vol.24, issue.7, pp.1-12, 2009.
DOI : 10.1016/j.cose.2005.08.003

M. Conti, I. Zachia-zlatea, and B. Crispo, Mind how you answer me!, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.249-259, 2011.
DOI : 10.1145/1966913.1966945

M. O. Derawi, C. Nickel, P. Bours, and C. Busch, Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.306-311, 2010.
DOI : 10.1109/IIHMSP.2010.83

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.5072

J. E. Ekberg, Mobile Trusted Computing Based on MTM, IJDTIS, vol.1, issue.4, pp.25-42, 2010.
DOI : 10.4018/978-1-61520-682-7.ch003

J. E. Ekberg and S. Bugiel, Trust in a small package, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.9-18, 2009.
DOI : 10.1145/1655108.1655111

D. E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, 1989.

. Google, Android: Android -open source project, 2011.

Y. S. Hwang and S. Y. Bang, An Efficient Method to Construct a Radial Basis Function Neural Network Classifier, Neural Networks, vol.10, issue.8, pp.1495-1503, 1997.
DOI : 10.1016/S0893-6080(97)00002-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.651

S. Karatzouni and N. L. Clarke, Keystroke Analysis for Thumb-based Keyboards on Mobile Devices, pp.253-263, 2007.
DOI : 10.1007/978-0-387-72367-9_22

H. Kekre and V. Bharadi, Ageing Adaptation for Multimodal Biometrics using Adaptive Feature Set Update Algorithm, 2009 IEEE International Advance Computing Conference, pp.535-540, 2009.
DOI : 10.1109/IADCC.2009.4809068

J. Kennedy and R. C. Eberhart, Particle swarm optimization, Proceedings of ICNN'95, International Conference on Neural Networks, pp.1942-1948, 1995.
DOI : 10.1109/ICNN.1995.488968

K. Killourhy and R. Maxion, Why Did My Detector Do That?!, Proceedings of the 13th international conference on Recent advances in intrusion detection, pp.256-276, 2010.
DOI : 10.1007/978-3-642-15512-3_14

K. S. Killourhy and R. A. Maxion, Comparing anomaly-detection algorithms for keystroke dynamics, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.125-134, 2009.
DOI : 10.1109/DSN.2009.5270346

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.9744

R. A. Maxion and K. S. Killourhy, Keystroke biometrics with number-pad input, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.201-210, 2010.
DOI : 10.1109/DSN.2010.5544311

W. Moncur and G. Leplâtre, Pictures at the ATM, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.887-894, 2007.
DOI : 10.1145/1240624.1240758

M. Nauman and T. Ali, TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones, Information Security and Assurance, pp.286-297, 2010.
DOI : 10.1007/978-3-642-13365-7_28

M. Nauman, T. Ali, and A. Rauf, Using trusted computing for privacy preserving keystroke-based authentication in smartphones, Telecommunication Systems, vol.11, issue.1, pp.1-13, 2011.
DOI : 10.1007/s11235-011-9538-9

C. Nickel, M. O. Derawi, P. Bours, and C. Busch, Scenario test of accelerometer-based biometric gait recognition, 2011 Third International Workshop on Security and Communication Networks (IWSCN), 2011.
DOI : 10.1109/IWSCN.2011.6827712

P. C. Van-oorschot, A. Salehi-abari, and J. Thorpe, Purely Automated Attacks on PassPoints-Style Graphical Passwords, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, pp.393-405, 2010.
DOI : 10.1109/TIFS.2010.2053706

D. Perito, C. Castelluccia, M. A. Kâafar, and P. Manils, How unique and traceable are usernames? CoRR abs, p.5578, 1101.
DOI : 10.1007/978-3-642-22263-4_1

URL : http://arxiv.org/abs/1101.5578

. Safary-developer and . Library, Handling events, pp.40006511-40006512, 2011.

A. Salehi-abari, J. Thorpe, and P. Van-oorschot, On Purely Automated Attacks and Click-Based Graphical Passwords, 2008 Annual Computer Security Applications Conference (ACSAC), pp.111-120, 2008.
DOI : 10.1109/ACSAC.2008.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.2481

S. Wiedenbeck, J. Waters, L. Sobrado, and J. C. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, Proceedings of the working conference on Advanced visual interfaces , AVI '06, pp.177-184, 2006.
DOI : 10.1145/1133265.1133303

S. Zahid, M. Shahzad, S. Khayam, and M. Farooq, Keystroke-Based User Identification on Smart Phones, Lecture Notes in Computer Science, vol.5758, pp.224-243, 2009.
DOI : 10.1007/978-3-642-04342-0_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.9970

G. Zhang, J. Camenisch, S. Fischer-hübner, Y. Murayama, A. Portmann et al., Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users, Future Challenges in Security and Privacy for Academia and Industry, IFIP Advances in Information and Communication Technology, pp.247-258
DOI : 10.1007/978-3-642-21424-0_20