Stirling Numbers of the Second Kind, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, 1972. ,
The theory of planned behavior, Theories of Cognitive Self-Regulation, pp.179-211, 1991. ,
DOI : 10.1016/0749-5978(91)90020-T
Smudge attacks on smartphone touch screens, 4th USENIX Workshop on Offensive Technologies, WOOT '10, 2010. ,
Working Memory: Theories, Models, and Controversies, Annual Review of Psychology, vol.63, issue.1, pp.1-29, 2012. ,
DOI : 10.1146/annurev-psych-120710-100422
The phone lock, Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, TEI '11, pp.197-200, 2011. ,
DOI : 10.1145/1935701.1935740
Graphical passwords, ACM Computing Surveys, vol.44, issue.4, pp.1-1941, 2012. ,
DOI : 10.1145/2333112.2333114
The Magical Mystery Four, Current Directions in Psychological Science, vol.19, issue.1, pp.51-57, 2010. ,
DOI : 10.1038/nature04171
On user choice in graphical password schemes, Proceedings of the 13th USENIX Security Symposium, pp.151-164, 2004. ,
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, vol.13, issue.3, pp.319-340, 1989. ,
DOI : 10.2307/249008
Deja vu-a user study: Using images for authentication, 9th USENIX Security Symposium, 2000. ,
Biometric authentication of physical characteristics recognition using artificial neural network with PSO algorithm, Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS '08, pp.219-229, 2008. ,
DOI : 10.1504/IJCAT.2017.088196
Shouldersurfing resistant authentication using pass pattern of pattern lock, IEICE Transactions, vol.101, issue.1, pp.45-52, 2018. ,
The design and analysis of graphical passwords, Proceedings of the 8th Conference on USENIX Security Symposium - SSYM'99, pp.1-1, 1999. ,
Two Notes on Notation, The American Mathematical Monthly, vol.90, issue.25, pp.403-422, 1992. ,
DOI : 10.1017/S0013091500035367
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Computers & Security, vol.42, pp.137-150, 2014. ,
DOI : 10.1016/j.cose.2013.12.001
Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry, IEEE Transactions on Information Forensics and Security, vol.9, issue.4, pp.695-708, 2014. ,
DOI : 10.1109/TIFS.2014.2307671
A survey on behavioral biometric authentication on smartphones, Journal of Information Security and Applications, vol.37, pp.28-37, 2017. ,
DOI : 10.1016/j.jisa.2017.10.002
THE ANATOMY OF SMARTPHONE UNLOCKING, GetMobile: Mobile Computing and Communications, vol.20, issue.3, pp.42-46, 2017. ,
DOI : 10.1109/ICNP.2014.43
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks, 5th USENIX Workshop on Offensive Technologies, pp.46-53, 2011. ,
Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, pp.433-446, 2010. ,
DOI : 10.1109/SP.2010.33
Usability Engineering, 1993. ,
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images, IEEE Transactions on Information Forensics and Security, vol.12, issue.12, pp.2875-2889, 2017. ,
DOI : 10.1109/TIFS.2017.2725199
URL : http://arxiv.org/pdf/1708.06508
Diffusion of innovations, 1995. ,
A PIN-entry method resilient against shoulder surfing, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.236-245, 2004. ,
DOI : 10.1145/1030083.1030116
Exploring the design space of graphical passwords on smartphones, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pp.1-11, 2013. ,
DOI : 10.1145/2501604.2501615
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.237-241, 2009. ,
DOI : 10.1109/SECURWARE.2009.43
A 3-d hand gesture signature based biometric authentication system for smartphones, pp.1359-1373, 2016. ,
SwiPIN, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.1403-1406, 2015. ,
DOI : 10.1145/1030083.1030116
Design and evaluation of a shoulder-surfing resistant graphical password scheme, Proceedings of the working conference on Advanced visual interfaces , AVI '06, pp.177-184, 2006. ,
DOI : 10.1145/1133265.1133303