A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
 X. Suo and G. S. Owen, “Graphical Passwords : A Survey,” 21st Annu. Comput. Secur. Appl. Conf., no. Acsac, pp. 10 pp. – 472, 2005, doi: 10.1109/CSAC.2005.27.
 A. Paivio’s and J. C. Yuille, “Imagery, Memory and Cognition (PLE: Memory),” in Essays in Honor of Allan Paivio, London: Psychology Press, 1983, pp. 65–139.
 P. Jadhao and L. Dole, “Survey on Authentication Password Techniques,” Int. J. Soft Comput. Eng., vol. 3, no. 2, pp. 67–68, 2013.
 S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, “Multiple Password Interference in Text andClick-Based Graphical Passwords,” in Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009, pp. 500–511, doi: https://doi.org/10.1145/1653662.1653722.
 A. Y. Ng and M. I. Jordan, “On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes.,” Adv. neural Inf. Process. Syst., 2002.
 S. Keerthi and Sathiya, “A fast iterative nearest point algorithm for support vector machine classifier design,” IEEE Trans. neural networks 11.1, pp. 124–136, 2000.
 K. Chomboon, “An empirical study of distance metrics for k-nearest neighbor algorithm,” Proc. 3rd Int. Conf. Ind. Appl. Eng., 2015.
 D. C. Feldmeier and P. R. Karn, “UNIX Password Security - Ten Years Later,” in Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, 1989, pp. 44–63.
 R. N.Shepard, “Recognition Memory for Words, Sentences, and Pictures,” J. Verbal Learning Verbal Behav., vol. 6, pp. 156–163, 1967, doi: https://doi.org/10.1016/S0022-5371(67)80067-7.
 L. Sreeramareddy, J. H. Feng, and A. Sears, “Poster : Preliminary Investigation of Gesture-Based Password : Integrating Additional User Behavioral Features,” pp. 4–5.
 I. Jermyn et al., “The Design and Analysis of Graphical Passwords,” in Proceedings of the 8th USENIX Security Symposium, 1999.
 D. Nali and J. Thorpe, “Analyzing user choice in graphical passwords,” Sch. Comput. Sci. Carlet. Univ. Tech Rep TR0401, pp. 1–6, 2004, doi: 10.1.1.85.998.
 C. Varenhorst, M. Van Kleek, and L. Rudolph, “Passdoodles ; a Lightweight Authentication Method under the direction of,” 2004.
 D. Mejía V. and J. Doose, “Gesture Based Touchpad Security System.”
 A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, “Touch me once and i know it’s you! Implicit authentication based on touch screen patterns,” Conf. Hum. Factors Comput. Syst. - Proc., no. January 2014, pp. 987–996, 2012, doi: 10.1145/2207676.2208544.
 N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, “Biometric-rich gestures: A novel approach to authentication on multi-touch devices,” Conf. Hum. Factors Comput. Syst. - Proc., no. May, pp. 977–986, 2012, doi: 10.1145/2207676.2208543.
 L. Sreeramareddy, A. Janprasert, and J. Heidifeng, “Evaluating Gesture-Based Password And Impact of Input Devices,” in Proceedings of the International Conference on Security and Management (SAM), 2014.
 L. Sreeramareddy, S. Miao, and J. H. Feng, “Investigating gesture-based password: Usability and vulnerability to shoulder-surfing attacks,” Res. Adapt. Converg. Syst. RACS 2014, pp. 230–235, 2014, doi: 10.1145/2663761.2664207.
 L. Anthony and J. O. Wobbrock, “A lightweight multistroke recognizer for user interface prototypes,” Proc. - Graph. Interface, pp. 245–252, 2010.