Using automated model analysis for reasoning about security of web protocolsApurva Kumar2012ACSAC 2012
Biometric authentication on a mobile device: A study of user effort, error and task disruptionShari TrewinCal Swartet al.2012ACSAC 2012