||﹝1﹞ Symantec, Symantec Internet Security Threat Report: Trends for 2010, 2011.|
﹝2﹞ BBC News, UK police foil massive bank theft, BBC News, March 17, 2005.
﹝3﹞ InfoWatch, Global Data Leakage Report 2010, 2011.
﹝4﹞ Perry S. Kivolowitz, A Program To Allow ANYONE To Crack Unix (4.1 and 2), Available from: http://securitydigest.org/unix/archive/006, November 17, 1983.
﹝5﹞ Stefano Ortolani, Cristiano Giuffrida, and Bruno Crispo, Bait your hook: a novel detection technique for keyloggers, Proceedings of the 13th international conference on Recent advances in intrusion detection, Ottawa, Ontario, Canada, 2010.
﹝6﹞ Wuul, Log This!, 2008.
﹝7﹞ Wuul, AntiKeylogger, 2007.
﹝8﹞ SpyReveal, SpyReveal, 2009.
﹝9﹞ Fabian Mihailowitsch, Detecting Hardware Keylogger, 2010.
﹝10﹞ Frank J. Cini, Keystroke Encryption System, Application Number: 20100195825, 2010.
﹝11﹞ Michael Kassner, KeyScrambler: How keystroke encryption works to thwart keylogging threats, Available from: http://www.techrepublic.com/blog/security/keyscrambler-how-keystroke-encryption-works-to-thwart-keylogging-threats/4648, October 25, 2010.
﹝12﹞ A. Young and Yung Moti, Deniable password snatching: on the possibility of evasive electronic espionage, IEEE Symposium on Security and Privacy, pp. 224-235, 1997.
﹝13﹞ Jonathan M. McCune, Adrian Perrig, and Michael K. Reiter, Bump in the ether: a framework for securing sensitive user input, Proceedings of the annual conference on USENIX '06 Annual Technical Conference, Boston, MA, 2006.
﹝14﹞ R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, 21, 2, pp. 120-126, 1978.
﹝15﹞ M. Hirano, et al., T-PIM: Trusted Password Input Method against Data Stealing Malware, International Conference on Information Technology, pp. 429-434, 2009.
﹝16﹞ K. Chen, Reversing and Exploiting an AppleR Firmware Update, Black Hat, Las Vegas, Nevada, 2009.
﹝17﹞ Li Zhuang, Feng Zhou, and J. D. Tygar, Keyboard acoustic emanations revisited, Proceedings of the 12th ACM conference on Computer and communications security, Alexandria, VA, USA, 2005.
﹝18﹞ Yigael Berger, Avishai Wool, and Arie Yeredor, Dictionary attacks using keyboard acoustic emanations, Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2006.
﹝19﹞ Andrew Kelly, Cracking Passwords using Keyboard Acoustics and Language Modeling, The University of Edinburgh, Master, 2010.
﹝20﹞ Martin Vuagnoux and Sylvain Pasini, Compromising electromagnetic emanations of wired and wireless keyboards, Proceedings of the 18th conference on USENIX security symposium, Montreal, Canada, 2009.
﹝21﹞ Kehuan Zhang and XiaoFeng Wang, Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems, Proceedings of the 18th conference on USENIX security symposium, Montreal, Canada, 2009.
﹝22﹞ Andrea Barisani and Daniele Bianco, Sniff Keystrokes With Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage, DEFCON 17, Riviera Hotel and Casino, 2009.
﹝23﹞ M. N. Doja and N. Kumar, Image Authentication Schemes against Key-Logger Spyware, ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 574-579, 2008.
﹝24﹞ Hu Wei, Wu Xiaoping, and Wei Guoheng, The Security Analysis of Graphical Passwords, International Conference on Communications and Intelligence Information Security, pp. 200-203, 2010.
﹝25﹞ Elizabeth Stobert, et al., Exploring usability effects of increasing security in click-based graphical passwords, Proceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, 2010.
﹝26﹞ Amos P. Waterland, Secure password entry, Application Number: 10/849,610, 2009.
﹝27﹞ Kaspersky Lab., Kaspersky Internet Security 2009 includes a virtual keyboard that enables users to enter logins and passwords safely, Available from: http://www.kaspersky.com/news?id=207575675, August 22, 2008.
﹝28﹞ Douglas Hoover, Method and apparatus for secure entry of access codes in a computer environment, US Patent No. 6,209,102, Application Number: 09/249,043, 2001.
﹝29﹞ Jake Brill, More Ways to Stay Secure, Available from: http://blog.facebook.com/blog.php?post=436800707130.
﹝30﹞ Nishit Shah, Advanced sign-in security for your Google account, Available from: http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html.
﹝31﹞ Min Wu, Simson Garfinkel, and Rob Miller, Secure Web Authentication with Mobile Phones, DIMACS Workshop on Usable Privacy and Security Software, 2004.
﹝32﹞ A. Pashalidis and C. J. Mitchell, Impostor: a single sign-on system for use from untrusted devices, IEEE GLOBECOM, pp. 2191-2195 Vol.4, 2004.
﹝33﹞ Eric Gieseke and John McLaughlin, Title, Available from: http://simson.net/ref/2004/csci_e-170/handouts/final/egieseke-john_mclaughlin_paper.pdf, Harvard University Extension, 2005.
﹝34﹞ A. Pashalidis, Accessing Password-Protected Resources without the Password, WRI World Congress on Computer Science and Information Engineering, pp. 66-70, 2009.
﹝35﹞ Florencio Dinei and Herley Cormac, KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy, Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual, pp. 67-76, 2006.
﹝36﹞ Tim Rogers, Full Reactive Eyes Entertainment, Game Developer, December, 2010.
﹝37﹞ Radicati Group, Email Statistics Report, 2010-2014, 2010.
﹝38﹞ KZero, Virtual Worlds 2011+, 2011.
﹝39﹞ Miniwatts Marketing Group, World Internet Usage abd Population Statistics, Available from: http://www.internetworldstats.com/stats.htm, March 31, 2011.
﹝40﹞ National Institute of Standards and Technology, Advanced Encryption Standard, Federal Information Processing Standards-197, USA, 2001.
﹝41﹞ Inc. Apple Computer, Mozilla Foundation, and Opera Software ASA., HTML Living Standard, http://www.whatwg.org, 2011.
﹝42﹞ Damballa, Top 10 Botnet Threat Report - 2010, 2011.