Are You Ready to Lock?, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.750-761, 2014. ,
DOI : 10.1146/annurev.eg.01.110176.003213
It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception, Proc. SOUPS, pp.213-230, 2014. ,
Patterns in the wild, Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, MobileHCI '13, pp.261-270, 2013. ,
DOI : 10.1145/2493190.2493231
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs, Proc. FC '12, pp.25-40, 2012. ,
DOI : 10.1007/978-3-642-32946-3_3
Exploring the design space of graphical passwords on smartphones, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, p.11, 2013. ,
DOI : 10.1145/2501604.2501615
Old wine in new bottles or novel challenges, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2689-2698, 2011. ,
DOI : 10.1145/1978942.1979336
Sentiment of emojis, PloS one, vol.10, issue.0144, p.296, 2015. ,
Keep on Lockin' in the Free World, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.4823-4827, 2016. ,
DOI : 10.1145/2493190.2493231
Comparing passwords, tokens, and biometrics for user authentication, Proceedings of the IEEE, vol.91, issue.12, pp.2021-2040, 2003. ,
DOI : 10.1109/JPROC.2003.819611
Password memorability and security: empirical results, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.25-31, 2004. ,
DOI : 10.1109/MSP.2004.81
Pin selection policies: Are they really effective? computers & security, pp.484-496, 2012. ,
DOI : 10.1016/j.cose.2012.02.003
Graphical passwords, ACM Computing Surveys, vol.44, issue.4, p.19, 2012. ,
DOI : 10.1145/2333112.2333114
Android Security Internals: An In-Depth Guide to Android's Security Architecture, 2015. ,
On User Choice in Graphical Password Schemes, USENIX Security Symposium, pp.11-11, 2004. ,
EmojiAuth: Quantifying the Security of Emoji-based Authentication, Proceedings 2017 Workshop on Usable Security, 2017. ,
DOI : 10.14722/usec.2017.23024
Exploring Psychological Need Fulfillment for Security and Privacy Actions on Smartphones, Proceedings 1st European Workshop on Usable Security, 2016. ,
DOI : 10.14722/eurousec.2016.23009
User Experience in Authentication Research: A Survey, 5th ISCA/DEGA Workshop on Perceptual Quality of Systems (PQS 2016), pp.54-58, 2016. ,
DOI : 10.21437/PQS.2016-12
Crying with laughter: how we learned how to speak emoji. http: //www.theguardian.com/technologycrying-with- laughter-how-we-learned-how-to-speak-emoji. (accessed, pp.2017-2020, 2015. ,
Password entry usability and shoulder surfing susceptibility on different smartphone platforms, Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, MUM '12, p.13, 2012. ,
DOI : 10.1145/2406367.2406384
Memory retrieval and graphical passwords, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pp.1-1514, 2013. ,
DOI : 10.1145/2501604.2501619
URL : http://cups.cs.cmu.edu/soups/2013/proceedings/a15_Stobert.pdf
emojitracker: realtime emoji use on twitter, pp.2017-2020 ,
Graphical Password Authentication Using Cued Click Points, Proc. ESORICS '07, pp.359-374, 2007. ,
DOI : 10.1007/978-3-540-74835-9_24
URL : http://www.scs.carleton.ca/research/tech_reports/2007/download/TR-07-13.pdf
The Inference of Perceived Usability From Beauty, Human-Computer Interaction, vol.25, issue.3, pp.235-260, 2010. ,
DOI : 10.1080/07370024.2010.500139
The Thing and I: Understanding the Relationship Between User and Product, pp.31-42, 2003. ,
DOI : 10.1007/1-4020-2967-5_4
On the ecological validity of a password study, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, p.13, 2013. ,
DOI : 10.1145/2501604.2501617
View from a distance, Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion, MobileHCI '12, pp.113-118, 2012. ,
DOI : 10.1145/2371664.2371686
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.56-66, 2006. ,
DOI : 10.1145/1143120.1143128
Binary codes capable of correcting deletions, insertions and reversals, In: Soviet physics doklady, vol.10, p.707, 1966. ,