A. Adams and M. A. Sasse, Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999.
DOI : 10.1145/322796.322806

M. D. Barense, J. K. Ngo, L. H. Hung, and M. A. Peterson, Interactions of Memory and Perception in Amnesia: The Figure-Ground Perspective, Cerebral Cortex, vol.22, issue.11, pp.2680-2691, 2012.
DOI : 10.1093/cercor/bhr347

C. J. Berry, D. R. Shanks, M. Speekenbrink, and R. N. Henson, Models of recognition, repetition priming, and fluency: Exploring a new framework., Psychological Review, vol.119, issue.1, pp.40-79, 2012.
DOI : 10.1037/a0025464

R. Biddle, S. Chiasson, and P. Van-oorschot, Graphical passwords, ACM Computing Surveys, vol.44, issue.4, pp.1-1941, 2012.
DOI : 10.1145/2333112.2333114

J. Blocki, S. Komanduri, L. F. Cranor, and A. Datta, Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23094

URL : http://arxiv.org/abs/1410.1490

H. Bojinov, D. Sanchez, P. Reber, D. Boneh, and P. Lincoln, Neuroscience meets cryptography, USENIX Security Symposium, ser. SSYM '12, pp.129-141, 2012.
DOI : 10.1145/2594445

J. Bonneau, E. Bursztein, I. Caron, R. Jackson, and M. Williamson, Secrets, Lies, and Account Recovery, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.141-150, 2015.
DOI : 10.1145/2736277.2741691

J. Bonneau, C. Herley, P. C. Van-oorschot, and F. Stajano, The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, 2012 IEEE Symposium on Security and Privacy, pp.553-567, 2012.
DOI : 10.1109/SP.2012.44

J. Bonneau, M. Just, and G. Matthews, What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions, " in Financial Cryptography and Data Security, ser. FC '10, pp.98-113, 2010.

J. Bonneau and S. Preibusch, The Password Thicket: Technical and Market Failures in Human Authentication on the Web, Workshop on the Economics of Information Security, ser. WEIS '10, 2010.

J. Bonneau and S. Schechter, Towards Reliable Storage of 56-bit Secrets in Human Memory, USENIX Security Symposium, ser. SSYM '14, pp.607-623, 2014.

J. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung, Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006.
DOI : 10.1145/1180405.1180427

C. B. Cave, Very Long-Lasting Priming in Picture Naming, Psychological Science, vol.8, issue.4, pp.322-325, 1997.
DOI : 10.1037/0278-7393.13.3.501

D. Davis, F. Monrose, and M. K. Reiter, On User Choice in Graphical Password Schemes, USENIX Security Symposium, ser. SSYM '04, pp.151-164, 2004.

J. Deng, W. Dong, R. Socher, L. Li, K. Li et al., ImageNet: A Large-Scale Hierarchical Image Database, IEEE Conference on Computer Vision and Pattern Recognition, ser. CVPR '09, pp.248-255, 2009.

T. Denning, K. Bowers, M. Van-dijk, and A. Juels, Exploring implicit memory for painless password recovery, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2615-2618, 2011.
DOI : 10.1145/1978942.1979323

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.229.1461

R. J. Dolan, G. R. Fink, E. Rolls, M. Booth, A. Holmes et al., How the Brain Learns to See Objects and Faces in an Impoverished Context, Nature, vol.389, issue.6651, pp.596-599, 1997.
DOI : 10.1038/39309

S. L. Garfinkel, Email-based identification and authentication: an alternative to PKI?, IEEE Security & Privacy Magazine, vol.1, issue.6, pp.20-26, 2003.
DOI : 10.1109/MSECP.2003.1253564

M. S. Gazzaniga and C. Neuroscience, The Biology of the Mind, 2013.

M. A. Gluck, Learning and Memory: From Brain to Behavior, 2014.

V. Griffith and M. Jakobsson, Messin??? with Texas Deriving Mother???s Maiden Names Using Public Records, Conference on Applied Cryptography and Network Security, ser. ACNS '05, pp.91-103, 2005.
DOI : 10.1007/11496137_7

E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, Use Your Illusion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.35-45, 2008.
DOI : 10.1145/1408664.1408670

A. Hern, Google Aims to Kill Passwords, 2016.

P. Hsieh, E. Vul, and N. Kanwisher, Recognition Alters the Spatial Pattern of fMRI Activation in Early Retinotopic Cortex, Changes in Functional Connectivity Support Conscious Object Recognition, pp.1501-1507, 2010.
DOI : 10.1152/jn.00812.2009

F. Imamoglu, C. Koch, and J. Haynes, MoonBase: Generating a database of two-tone "Mooney" images, Journal of Vision, vol.13, issue.9, pp.50-50, 2013.
DOI : 10.1167/13.9.50

J. M. Kizilirmak, J. Galvao-gomes-da-silva, F. Imamoglu, and A. Richardson-klavehn, Generation and the subjective feeling of ???aha!??? are independently related to learning from insight, Psychological Research, vol.25, issue.11, pp.1059-1074, 2016.
DOI : 10.1523/JNEUROSCI.5295-04.2005

R. Ludmer, Y. Dudai, and N. Rubin, Uncovering Camouflage: Amygdala Activation Predicts Long-Term Memory of Induced Perceptual Insight, Neuron, vol.69, issue.5, pp.1002-1014, 2011.
DOI : 10.1016/j.neuron.2011.02.013

D. E. Meyer and R. W. Schvaneveldt, Facilitation in recognizing pairs of words: Evidence of a dependence between retrieval operations., Journal of Experimental Psychology, vol.90, issue.2, pp.227-234, 1971.
DOI : 10.1037/h0031564

D. B. Mitchell, A. S. Brown, and D. R. Murphy, Dissociations between procedural and episodic memory: Effects of time and aging., Psychology and Aging, vol.5, issue.2, pp.264-276, 1990.
DOI : 10.1037/0882-7974.5.2.264

C. M. Mooney, Age in the development of closure ability in children., Canadian Journal of Psychology/Revue canadienne de psychologie, vol.11, issue.4, pp.219-226, 1957.
DOI : 10.1037/h0083717

R. Nieva, Yahoo Wants to Kill Passwords http://www.cnet. com/news/yahoo-wants-to-kill-passwords-with-revamped-mail-app, 2015.

N. Otsu, A Threshold Selection Method from Gray-Level Histograms, IEEE Transactions on Systems, Man, and Cybernetics, vol.9, issue.1, pp.62-66, 1979.
DOI : 10.1109/TSMC.1979.4310076

R. User-corporation, The Science Behind Passfaces, 2004.

K. Renaud and M. Just, Pictures or Questions? Examining User Responses to Association-Based Authentication, BCS Conference on Human-Computer Interaction, ser. HCI '10, pp.98-107, 2010.

D. L. Schacter and R. D. Badgaiyan, Neuroimaging of Priming: New Perspectives on Implicit and Explicit Memory, Current Directions in Psychological Science, vol.8, issue.1, pp.1-4, 2001.
DOI : 10.1037/0033-295X.99.2.195

S. Schechter, A. J. Brush, and S. Egelman, It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions, 2009 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009.
DOI : 10.1109/SP.2009.11

S. Schechter, S. Egelman, and R. W. Reeder, It's Not What You Know, But Who You Know: A Social Approach to Last-Resort Authentication, SIGCHI Conference on Human Factors in Computing Systems, ser. CHI '09, pp.1983-1992, 2009.

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

C. Tallon-baudry, O. Bertrand, C. Delpuech, and J. Permier, Oscillatory Gamma-Band (30-70 Hz) Activity Induced by a Visual Search Task in Humans, The Journal of Neuroscience, vol.17, issue.2, pp.722-734, 1997.

N. B. Turk-browne, D. Yi, and M. M. Chun, Linking Implicit and Explicit Memory: Common Encoding Factors and Shared Representations, Neuron, vol.49, issue.6, pp.917-927, 2006.
DOI : 10.1016/j.neuron.2006.01.030

URL : http://doi.org/10.1016/j.neuron.2006.01.030

D. Weinshall and S. Kirkpatrick, Passwords you'll never forget, but can't recall, Extended abstracts of the 2004 conference on Human factors and computing systems , CHI '04, pp.1399-1402, 2004.
DOI : 10.1145/985921.986074

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.2521

M. Wilson, MRC psycholinguistic database: Machine-usable dictionary, version 2.00, Behavior Research Methods, Instruments, & Computers, vol.17, issue.1, pp.6-10, 1988.
DOI : 10.3758/BF03202594

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.6928

M. Zviran and W. J. Haga, A Comparison of Password Techniques for Multilevel Authentication Mechanisms, The Computer Journal, vol.36, issue.3, pp.227-237, 1993.
DOI : 10.1093/comjnl/36.3.227