1. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing;Ahern,2007
2. Graphical passwords in the wild: understanding how users choose pictures and passwords in image-based authentication schemes;Alt,2015
3. The role of visual coherence in graphical passwords;Aydın,2013
4. Bates, D., Mächler, M., Bolker, B. and Walker, S., 2014. Fitting linear mixed-effects models using lme4.
5. FlexPass: symbiosis of seamless user authentication schemes in IoT;Belk,2019