[1]Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz, "Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 161-172.
[2]M. Lei, Y. Xiao, S. V. Vrbsky, C.-C. Li, and L. Liu, "A virtual password scheme to protect passwords," in Proceedings of IEEE International Conference on Communications (ICC '08), 2008, pp. 1536–1540.
[3]Y.-L. Chen, W.-C. Ku, Y.-C. Yeh, and D.-M. Liao, "A simple text-based shoulder surfing resistant graphical password scheme," in IEEE International Symposium on Next-Generation Electronics (ISNE‘13), 2013, pp. 161–164.
[4]I. Altiok, S. Uellenbeck, and T. Holz, "GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones," in Sicherheit, 2014, pp. 25–35.
[5]Y. Kita, F. Sugai, M. Park, and N. Okazaki, "Proposal and implementation of a shoulder-surfing attack resistant authentication method using two shift functions," in Proceedings of The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), 2013.
[6]S.-H. Kim, J.-W. Kim, S.-Y. Kim, and H.-G. Cho, "A new shoulder-surfing resistant password for mobile environments," in Proceedings of the 5thInternational Conference on Ubiquitous Information Management and Communication, 2011.
[7]M.-K. Lee, "Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry," in IEEE Transactions on Information Forensics and Security, 2014.
[8]H. Yi, Y. Piao, and J. H. Yi, "Touch Logger Resistant Mobile Authentication Scheme Using Multimodal Sensors," in Advanced in Computer Science and its Applications, ed: Springer, 2014, pp. 19–26.
[9]Nilesh Chakraborty, Samrat Mondal, "Color Pass: An Intelligent User Interface to Resist Shoulder Surfing Attack," in Proceedings of the 2014 IEEE Students' Technology Symposium, 2014, pp.13-18.
[10]Taekyoung Kwon, Jin Hong, "Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks," IEEE Transactions on Information Forensics and Security, vol. 10, 2014, pp. 278–292.
[11]A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices," in Proceedings of the 5th international conference on Tangible, embedded, and embodied interaction, 2011, pp. 197–200.
[12]T. Perkovic, M. Cagalj, and N. Rakic, "SSSL: shoulder surfing safe login," in 17th International Conference on Software, Telecommunications & Computer Networks (SoftCOM '09), 2009, pp. 270–275.
[13]N. Chakraborty and S. Mondal, "SLASS: Secure Login against Shoulder Surfing," in Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, 2014, pp. 346–357.
[14]C.-C. Yao, "Shoulder surfing resistant graphical password scheme," 銘傳大學電腦與通訊工程學系碩士論文, 2011.
[15]蔡卓倫,「行動裝置防肩窺攻擊之身分認證機制」,銘傳大學電腦與通訊工程學系碩士論文,民國103年[16]Ting-Yi Chang, Cheng-Jung Tsaib, Jyun-Hao Lina, "A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices," Journal of Systems and Software, 2012, vol. 85, pp. 1157–1165.
[17]Hataichanok Saevanee, Pattarasinee Bhatarakosol, "User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device," in Proceedings of International Conference on Computer and Electrical Engineering, 2008, pp.82-86.
[18]Toan Van Nguyen, Napa Sae-Bae, Nasir Memon, "Finger-drawn PIN Authentication On Touch Devices," in Proceedings of IEEE International Conference on Image Processing (ICIP), 2014, pp. 5002–5006.
[19]Kumi Nakamura, Kazuhiro Kono, Yoshimichi Ito, Noboru Babaguchi, "Tablet Owner Authentication Based on Behavioral Characteristics of Multi-Touch Actions," in Proceedings of the 21st International Conference on Pattern Recognition, 2012, pp. 3431–3434.
[20]Napa Sae-Bae, Nasir Memon, Katherine Isbister, Kowsar Ahmed, "Multitouch Gesture-Based Authentication," IEEE Transactions on Information Forensics and Security, vol. 9, 2014, pp. 568–582.
[21]Zahid Syed, Jordan Helmick, Sean Banerjee, Bojan Cukic, "Effect of User Posture and Device Size on the Performance of Touch-based Authentication Systems," in Proceedings of IEEE 16th International Symposium on High Assurance Systems Engineering, 2015, pp.10-17.
[22]Chao Shen, Yong Zhang, Xiaohong Guan, Roy A. Maxion, "Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication," IEEE Transactions on Information Forensics and Security, vol. 11, 2016, pp. 498–513.