1Birget J C, Hong D, Memon N. Graphical Passwords Based on Robust DiscretizationIEEE Transactions on Information Fo- rensics and Security,2006,1(3):395-399.
2Sobrado L,Birget J C.Graphical passwords[J].An Electronic Bulletin for Undergraduate Research,2002(4):19-23.
3Birget J C,Hong D,Memon N.Graphical passwords based on robust discretization[C].IEEE Transactions on Information Forensics and Security,2006:395-399.
4Perrig A,Song D.Hash visualization:A new technique to improve real-world security[C].Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce,1999:35-39.
6Jermyn I,Mayer A,Monrose F,et al.The design and analysis of graphical passwords[C].Proc Symposium,1999:13-16.
7Thorpe J,Oorschot P C.Graphical dictionaries and the memoruble space of graphical passwords[C].San Deign:Proceedings of the 13th USENIX Security Symposium.USA:USENIX,2004:66-70.
8Wiedenbe.ck S,Waters J,Birget J C,et al.Authentication using graphical passwords:Effects of tolerance and image choice[C].Symposium on Usable Privacy and Security(SOUPS).USA:Pittsburgh,2005:103-107.
9Sonia Chiasson,RoBert Biddle,van Oorschot P C.A second look at the usability of click-based graphical passwords[C].Symposium On Usable Privacy and Security(SOUPS).USA:Pittsburgh,2007:18-20.
10Nali D,Thorpe J.Analyzing user choice in graphical passwords[R].Canada:School of Informatinn Technology and Engineering,University of Ottawa,2004.