D. Angeli, A. Coventry, L. Johnson, G. Renaud, and K. , Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.128-152, 2005.
DOI : 10.1016/j.ijhcs.2005.04.020

S. Chiasson, P. C. Oorschot, and R. Biddle, Graphical Password Authentication Using Cued Click Points, 12th European Symposium On Research In Computer Security, pp.359-374, 2007.
DOI : 10.1007/978-3-540-74835-9_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.866

C. Hinds and C. Ekwueme, Increasing security and usability of computer systems with graphical passwords, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.529-530, 2007.
DOI : 10.1145/1233341.1233448

S. Chiasson, A. Forget, R. Biddle, and P. C. Oorschot, User interface design affects security: patterns in click-based graphical passwords, International Journal of Information Security, vol.63, issue.3, pp.387-398, 2009.
DOI : 10.1007/s10207-009-0080-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.6347

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.102-127, 2005.
DOI : 10.1016/j.ijhcs.2005.04.010

P. C. Oorschot, A. Salehi-abari, and J. Thorpe, Purely Automated Attacks on PassPoints-Style Graphical Passwords, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, pp.393-405, 2010.
DOI : 10.1109/TIFS.2010.2053706

D. Davis, F. Monrose, and M. K. Reiter, On user choice in graphical password schemes, Proceedings of the 13th USENIX security symposium, pp.1-11, 2004.

T. S. Tullis and D. P. Tedesco, Using personal photos as pictorial passwords, CHI '05 extended abstracts on Human factors in computing systems , CHI '05, pp.1841-1844, 2005.
DOI : 10.1145/1056808.1057036

K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno, A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009.
DOI : 10.1145/1518701.1518837

A. E. Dirik, N. Memon, and J. Birget, Modelling user choice in the Passpoints graphical password scheme. Paper presented at the Symposium On Usable Privacy and Security, 2007.

K. Golofit, Click Passwords Under Investigation, Computer Security -ESORICS 2007, pp.343-358, 2007.
DOI : 10.1007/978-3-540-74835-9_23

K. Golofit, Picture passwords superiority and picture passwords dictionary attacks, Journal of Information Assurance and Security, vol.2, pp.179-183, 2007.

S. Peach, J. Voster, and R. V. Heerden, Heuristic Attacks against graphical password generators, Proceedings of the South African Information Security Multi-Conference, pp.272-284, 2010.

P. L. Lin, L. T. Weng, and P. W. Huang, Graphical Passwords Using Images with Random Tracks of Geometric Shapes, 2008 Congress on Image and Signal Processing, pp.27-31, 2008.
DOI : 10.1109/CISP.2008.603

A. Harada, T. Isarida, T. Mizuno, and M. Nishigaki, A User Authentication System Using Schema of Visual Memory, LNCS: Biologically Inspired Approaches to Advanced Information Technology, vol.3853, pp.338-345, 2006.
DOI : 10.1007/11613022_28

E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, Use Your Illusion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.35-45, 2008.
DOI : 10.1145/1408664.1408670

S. Chiasson, A. Forget, R. Biddle, and P. C. Oorschot, Influencing users towards better passwords: persuasive cued click-points, Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, pp.121-130, 2008.

M. Z. Jali, S. M. Furnell, and P. S. Dowland, Assessing image???based authentication techniques in a web???based environment, Information Management & Computer Security, vol.18, issue.1, pp.43-53, 2010.
DOI : 10.1016/j.ijhcs.2005.04.010

S. Chiasson, R. Biddle, and P. C. Oorschot, A second look at the usability of click-based graphical passwords, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.1-12, 2007.
DOI : 10.1145/1280680.1280682