References
[1 ]. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications oftheACM, Vol. 42,pp. 41-46, t 999.
[2]. R. Dhamija and A. Perrig, ""Deja Vu: A User Study Using Images for Authentication," In Proceedings of 9th USENIX Securitysymposium, 2000.
[3]. K. Gilhooly, "Biometrics: Getting Back to Business," In Computerworld, May09, 2005.
[4]. M. Kotadia, "Microsoft: Write down your passwords," In ZDNetAustraIia, May23, 2005.
[5]. S. Man, D. Hong, and M. Mathews, "A shoulder—surfing resistant graphical password scheme," In Proceedings of International conference on security and management. Las Vegas, NV, 2003.
[6]. Raj Mohammed, C. Shoba Bindu, R Chandrasekhar Reddy and B. Saiyanarayana, “A novel cognition based Graphical Authentication scheme which is resistant to shoulder—surfing attack”, Proceedings of the 2"“ lnternationa| conference on information Processing, ICIP 2008, Bangalore.
[7]. RealUser, realuser.com," |ast accessed in June 2005.
[8]. L. Sobrado and J.-C. Birget, "Graphical passwords," the Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, Vol. 4, 2002.
[9]. R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, Vol.6, pp. 156-1 63, t 967.
[1 0]. Xiao Yuan Suo Ying Zhu G. Scott. Owen “Graphical Passwords: A Survey