J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012.

S. Chiasson, P. C. Van-oorschot, and R. Biddle, Graphical Password Authentication Using Cued Click Points, ESORICS 2007, vol.4734, pp.359-374, 2007.
DOI : 10.1007/978-3-540-74835-9_24

URL : https://ir.library.carleton.ca/pub/3477/TR-07-13-1-.pdf

S. Chiasson, R. Biddle, and P. C. Van-oorschot, A Second Look at the Usability of Click-based Graphical Passwords, Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp.1-12, 2007.

S. Chiasson, E. Stobert, A. Forget, and R. Biddle, Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.2, pp.222-235, 2012.

D. Davis, F. Monrose, and M. K. Reiter, On User Choice in Graphical Password Schemes, Proceedings of the 13th Conference on USENIX Security Symposium (SSYM), pp.151-164, 2004.

A. E. Dirik, N. Memon, and J. C. Birget, Modeling user choice in the passpoints graphical password scheme, Proceedings of the 3rd Symposium on Usable privacy and security (SOUPS), pp.20-28, 2007.
DOI : 10.1145/1280680.1280684

URL : http://cups.cs.cmu.edu/soups/2007/proceedings/p20_dirik.pdf

P. Dunphy and J. Yan, Do background images improve "draw a secret" graphical passwords, Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp.36-47, 2007.
DOI : 10.1145/1315245.1315252

S. Fox, Future Online Password Could be a Map, 2010.

E. Georgakakis, N. Komninos, and C. Douligeris, NAVI: Novel Authentication with Visual Information, Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC), pp.588-595, 2012.
DOI : 10.1109/iscc.2012.6249360

URL : http://openaccess.city.ac.uk/14024/1/NAVI.pdf

K. Golofit, Click passwords under investigation, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS). Berlin, Heidelberg, pp.343-358, 2007.

I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, The Design and Analysis of Graphical Passwords, Proceedings of the 8th Conference on USENIX Security Symposium, pp.1-14, 1999.

D. Lin, P. Dunphy, P. Olivier, and J. Yan, Graphical passwords & qualitative spatial relations, Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp.161-162, 2007.
DOI : 10.1145/1280680.1280708

B. Macrae, A. Salehi-abari, and J. Thorpe, An Exploration of Geographic Authentication Schemes, IEEE Transactions on Information Forensics and Security, vol.11, issue.9, pp.1997-2012, 2016.

Y. Meng, Designing Click-Draw Based Graphical Password Scheme for Better Authentication, Proceedings of the 7th IEEE International Conference on Networking, Architecture, and Storage (NAS), pp.39-48, 2012.
DOI : 10.1109/nas.2012.9

Y. Meng and W. Li, Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme, Proceedings of the 14th International Conference on Information and Communications Security (ICICS), vol.7618, pp.349-356, 2012.

Y. Meng and W. Li, Evaluating the effect of user guidelines on creating click-draw based graphical passwords, Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS), pp.322-327, 2012.

Y. Meng, W. Li, and L. Kwok, Enhancing Click-Draw based Graphical Passwords Using Multi-Touch on Mobile Phones, Proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC), IFIP Advances in Information and Communication Technology 405, pp.55-68, 2013.
DOI : 10.1007/978-3-642-39218-4_5

URL : https://hal.archives-ouvertes.fr/hal-01463846

W. Meng, RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory, Proceedings of the 9th International Conference on Network and System Security (NSS), pp.147-161, 2015.
DOI : 10.1007/978-3-319-25645-0_10

W. Meng, Evaluating the Effect of Multi-Touch Behaviours on Android Unlock Patterns, Information and Computer Security, vol.24, issue.3, pp.277-287, 2016.

W. Meng, W. Li, D. S. Wong, and J. Zhou, TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones, Proceedings of the 14th International Conference on Applied Cryptography and Network Security (ACNS), pp.629-647, 2016.
DOI : 10.1007/978-3-319-39555-5_34

W. Meng, W. Li, L. Kwok, and K. R. Choo, Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones, Computers & Security, vol.65, pp.213-229, 2017.
DOI : 10.1016/j.cose.2016.11.010

URL : http://orbit.dtu.dk/en/publications/towards-enhancing-clickdraw-based-graphical-passwords-using-multitouch-behaviours-on-smartphones(c8c3970c-9083-43e1-8ab8-dbebb44cd2bb).html

W. Meng, W. Li, W. Lee, L. Jiang, and J. Zhou, A Pilot Study of Multiple Password Interference between Text and Map-based Passwords, Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS), pp.145-162, 2017.

W. Meng, W. Lee, M. H. Au, and Z. Liu, Exploring Effect of Location Number on Map-Based Graphical Password Authentication, Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP), pp.301-313, 2017.
DOI : 10.1007/978-3-319-59870-3_17

URL : http://orbilu.uni.lu/bitstream/10993/34111/1/ACISP_2017%20%281%29.pdf

D. L. Nelson, V. S. Reed, and J. R. Walling, Pictorial superiority effect, Journal of Experimental Psychology: Human Learning and Memory, vol.2, issue.5, pp.523-528, 1976.
DOI : 10.1037//0278-7393.2.5.523

. Passfaces,

R. N. Shepard, Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, vol.6, issue.1, pp.156-163, 1967.
DOI : 10.1016/s0022-5371(67)80067-7

J. Spitzer, C. Singh, and D. Schweitzer, A Security Class Project in Graphical Passwords, Journal of Computing Sciences in Colleges, vol.26, issue.2, pp.7-13, 2010.

J. Shin, S. Kancharlapalli, M. Farcasin, and E. Chan-tin, SmartPass: a smarter geolocation-based authentication scheme. Security and Communication Networks 8, pp.3927-3938, 2015.
DOI : 10.1002/sec.1311

X. Suo, Y. Zhu, and G. S. Owen, Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp.463-472, 2005.

H. Sun, Y. Chen, C. Fang, and S. Chang, PassMap: A Map Based GraphicalPassword Authentication System, Proceedings of AsiaCCS, pp.99-100, 2012.

H. Tao and C. Adams, Pass-Go: A Proposal to Improve the Usability of Graphical Passwords, International Journal of Network Security, vol.2, issue.7, pp.273-292, 2008.

J. Thorpe, B. Macrae, and A. Salehi-abari, Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme, Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS), pp.1-14, 2013.

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, Passpoints: Design and Longitudinal Evaluation of A Graphical Password System, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.102-127, 2005.

M. Weir, S. Aggarwal, M. Collins, and H. Stern, Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords, Proceedings of CCS, pp.162-175, 2010.

J. Yan, A. Blackwell, R. Anderson, and A. Grant, Password memorability and security: Empirical results, IEEE Security and Privacy, vol.2, pp.25-31, 2004.

X. Yu, Z. Wang, Y. Li, L. Li, W. T. Zhu et al., EvoPass: Evolvable graphical password against shoulder-surfing attacks, Computers & Security, vol.70, pp.179-198, 2017.