H. J. Asghar, S. Li, J. Pieprzyk, and H. Wang, Cryptanalysis of the convex hull click human identification protocol, International Journal of Information Security, vol.12, issue.2, pp.83-96, 2013.

C. Ashby, A. Bhatia, F. Tenore, and J. Vogelstein, Low-cost electroencephalogram (eeg) based authentication, 5th International IEEE/EMBS Conference on Neural Engineering -NER, pp.442-445, 2011.

R. Bednarik, T. Kinnunen, A. Mihaila, and P. Fränti, Eye-movements as a biometric, pp.780-789

H. Springer-berlin, , 2005.

K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, Image understanding for iris biometrics: A survey, Computer Vision and Image Understanding, vol.110, issue.2, pp.281-307, 2008.

M. M. Bradley and P. J. Lang, Memory, emotion, and pupil diameter: Repetition of natural scenes, Psychophysiology, vol.52, issue.9, pp.1186-1193, 2015.

S. Brostoff and M. A. Sasse, Are passfaces more usable than passwords? a field trial investigation, pp.405-424, 2000.

S. Chiasson, R. Biddle, and P. C. Van-oorschot, A second look at the usability of click-based graphical passwords, Proceedings of the 3rd Symposium on Usable Privacy and Security. pp. 1-12. SOUPS '07, 2007.

B. Choudhury, P. Then, B. Issac, V. Raman, and M. Haldar, A survey on biometrics and cancelable biometrics systems, International Journal of Image and Graphics, vol.18, 2018.

S. Cody, Do Only The Eyes Have It? Predicting Subsequent Memory with Simultaneous Neural and Pupillometry Data, 2015.

M. T. Curran, J. K. Yang, N. Merrill, and J. Chuang, Passthoughts authentication with low cost EarEEG, IEEE 38th Annual International Conference of the Engineering in Medicine and Biology Society -EMBC, pp.1979-1982, 2016.

R. Das, E. Maiorana, and P. Campisi, Eeg biometrics using visual stimuli: A longitudinal study, IEEE Signal Processing Letters, vol.23, issue.3, pp.341-345, 2016.

F. Deravi and S. P. Guness, Gaze trajectory as a biometric modality, Biosignals. pp, pp.335-341, 2011.

W. Einhäuser, The Pupil as Marker of Cognitive Processes, pp.141-169, 2017.

M. Ferrante and M. Saltalamacchia, The coupon collector's problem. Materials matemàtics pp, pp.1-35, 2014.

C. Galdi, M. Nappi, D. Riccio, V. Cantoni, and M. Porta, A new gaze analysis based soft-biometric, Pattern Recognition, pp.136-144, 2013.

C. Galdi, M. Nappi, D. Riccio, and H. Wechsler, Eye movement analysis for human authentication: a critical survey, Pattern Recognition Letters, vol.84, pp.272-283, 2016.

R. L. German and K. S. Barber, Consumer attitudes about biometric authentication, 2018.

M. Golla, T. Schnitzler, and M. Dürmuth, Will any password do? Exploring ratelimiting on the web, Who Are You ?! Adventures in Authentication, 2016.

C. A. Gomes, D. Montaldi, and A. Mayes, The pupil as an indicator of unconscious memory: Introducing the pupil priming effect, Psychophysiology, vol.52, issue.6, pp.754-769, 2015.

W. Jensen, S. Gavrila, and V. Korolev, Picture password: A visual login technique for mobile devices, 2003.

M. Just and D. Aspinall, Personal choice and challenge questions: a security and usability assessment, Proceedings of the 5th Symposium on Usable Privacy and Security, vol.8, 2009.

M. Just and D. Aspinall, Challenging challenge questions: An experimental analysis of authentication technologies and user behaviour, Policy & Internet, vol.2, issue.1, pp.99-115, 2010.

A. Kafkas and D. Montaldi, Recognition memory strength is predicted by pupillary responses at encoding while fixation patterns distinguish recollection from familiarity, The Quarterly Journal of Experimental Psychology, vol.64, issue.10, pp.1971-1989, 2011.

S. Karthika and P. Devaki, An efficient user authentication using captcha and graphical passwords -a survey, International Journal of Science and Research, p.123, 2014.

P. Kasprowski, O. V. Komogortsev, and A. Karpov, First eye movement verification and identification competition at btas 2012, IEEE 5th International Conference on Biometrics: Theory, Applications and Systems -BTAS, pp.195-202, 2012.

M. S. Klamkin and D. J. Newman, Extensions of the birthday surprise, Journal of Combinatorial Theory, vol.3, issue.3, pp.279-282, 1967.

K. Kollreider, H. Fronthaler, and J. Bigun, Evaluating liveness by face images and the structure tensor, IEEE 4th Workshop on Automatic Identification Advanced Technologies -AutoID, pp.75-80, 2005.

A. H. Lashkari, S. Farmand, O. B. Zakaria, and R. Saleh, Shoulder surfing attack in graphical password authentication, International Journal of Computer Science and Information Security -IJCSIS, vol.6, issue.2, 2009.

C. Lee and J. Kim, Cancelable fingerprint templates using minutiae-based bit-strings, Journal of network and computer applications, vol.33, issue.3, pp.236-246, 2010.

K. M. De-leeuw and J. Bergstra, The History of Information Security: A Comprehensive Handbook, 2007.

G. R. Loftus, Eye fixations and recognition memory for pictures, Cognitive Psychology, vol.3, issue.4, pp.525-551, 1972.

S. Marcel and J. D. Millán, Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation, vol.29, 2007.

D. Moon, J. H. Yoo, and M. K. Lee, Improved cancelable fingerprint templates using minutiae-based functional transform, Security and Communication Networks, vol.7, issue.10, pp.1543-1551, 2014.

N. Shepard and R. , Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, vol.6, pp.156-163, 1967.

, , pp.80067-80074

M. Naber, S. Frässle, U. Rutishauser, and W. Einhäuser, Pupil size signals novelty and predicts later retrieval success for declarative memories of natural scenes, Journal of vision, vol.13, issue.2, pp.11-11, 2013.

D. Noton and L. Stark, Scanpaths in saccadic eye movements while viewing and recognizing patterns, Vision Research, vol.11, issue.9, 1971.

N. Phetmak, W. Liwlompaisan, and P. Boonma, Travel password: A secure and memorable password scheme, Intelligent Information and Database Systems: 6th Asian Conference -ACIIDS, pp.402-411, 2014.

R. Rajan, T. Selker, and I. Lane, Task load estimation and mediation using psychophysiological measures, Proceedings of the 21st International Conference on Intelligent User Interfaces, pp.48-59, 2016.

K. Rayner, Eye movement latencies for parafoveally presented words, Bulletin of the Psychonomic Society, vol.11, issue.1, pp.13-16, 1978.

P. V. Reddy, A. Kumar, S. Rahman, and T. S. Mundra, A new antispoofing approach for biometric devices, vol.4, pp.328-365, 2008.

I. Rigas, E. Abdulin, and O. Komogortsev, Towards a multi-source fusion approach for eye movement-driven recognition, Information Fusion, vol.32, pp.13-25, 2016.

C. Roberts, Biometric attack vectors and defences, Computers & Security, vol.26, issue.1, pp.14-25, 2007.

S. Schechter, A. J. Brush, and S. Egelman, It's no secret. measuring the security and reliability of authentication via "secret" questions, 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009.

S. M. Segreti, W. Melicher, S. Komanduri, D. Melicher, R. Shay et al., Diversify to survive: Making passwords stronger with adaptive policies, 13th Symposium on Usable Privacy and Security -SOUPS, pp.1-12, 2017.

T. Selker, Understanding considerate systems -UCS (pronounced: You see us), 2010 International Symposium on Collaborative Technologies and Systems, pp.1-12, 2010.

S. Singh and G. Agarwal, Integration of sound signature in graphical password authentication system, International Journal of Computer Applications, vol.12, issue.9, pp.11-13, 2011.

I. Sluganovic, M. Roeschlin, K. B. Rasmussen, and I. Martinovic, Using reflexive eye movements for fast challenge-response authentication, Proceedings of the, 2016.

, ACM SIGSAC Conference on Computer and Communications Security, pp.1056-1067, 2016.

S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, Passpoints: Design and longitudinal evaluation of a graphical password system, International journal of human-computer studies, vol.63, issue.1-2, pp.102-127, 2005.

M. Zviran and W. J. Haga, Cognitive passwords: The key to easy access control, Computers & Security, vol.9, issue.8, pp.723-736, 1990.