S. Komanduri, R. Shay, P. Kelley, M. Mazurek, L. Bauer et al., Of passwords and people, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2595-2604, 2011.
DOI : 10.1145/1978942.1979321

P. Inglesant and A. Sasse, The true cost of unusable password policies, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.383-392, 2010.
DOI : 10.1145/1753326.1753384

D. Florencio and C. A. Herley, A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.657-666, 2007.
DOI : 10.1145/1242572.1242661

A. Adams and A. Sasse, Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999.
DOI : 10.1145/322796.322806

R. Shay, S. Komanduri, P. Kelley, P. Leon, M. Mazurek et al., Encountering stronger password requirements, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, 2010.
DOI : 10.1145/1837110.1837113

J. Bonneau, C. Herley, P. Van-oorschot, and F. Stajano, The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, 2012 IEEE Symposium on Security and Privacy, pp.553-567, 2012.
DOI : 10.1109/SP.2012.44

D. Leblanc, A. Forget, and R. Biddle, Guessing click-based graphical passwords by eye tracking, 2010 Eighth International Conference on Privacy, Security and Trust, pp.197-204, 2010.
DOI : 10.1109/PST.2010.5593249

J. Zhang, X. Luo, S. Akkaladevi, and J. Ziegelmayer, Improving multiple-password recall: an empirical study, European Journal of Information Systems, vol.17, issue.1, pp.165-176, 2009.
DOI : 10.1109/MSP.2004.81

A. D. Angeli, L. Coventry, G. Johnson, and K. Renaud, Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.128-152, 2005.
DOI : 10.1016/j.ijhcs.2005.04.020

K. M. Everitt, T. Bragin, J. Fogarty, and T. A. Kohno, A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009.
DOI : 10.1145/1518701.1518837

T. S. Tullis, D. P. Tedesco, and K. E. Mccaffrey, Can users remember their pictorial passwords six years later, Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA '11, pp.1789-1794, 2011.
DOI : 10.1145/1979742.1979945

R. Biddle, S. Chiasson, and P. Van-oorschot, Graphical passwords, ACM Computing Surveys, vol.44, issue.4, p.41, 2012.
DOI : 10.1145/2333112.2333114

S. Brostoff and M. A. Sasse, Are Passfaces More Usable than Passwords: A Field Trial Investigation UK (2000) 15. Passfaces Corporation. The science behind Passfaces, BCS International Conference on People and Computers, pp.405-410
DOI : 10.1007/978-1-4471-0515-2_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.6603

K. Everitt, T. Bragin, J. Fogarty, and T. Kohno, A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009.
DOI : 10.1145/1518701.1518837

E. Stobert, A. Forget, S. Chiasson, P. Van-oorschot, and R. Biddle, Exploring usability effects of increasing security in click-based graphical passwords, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.79-88, 2010.
DOI : 10.1145/1920261.1920273

I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, The Design and Analysis of Graphical Passwords, USENIX Security Symposium, pp.1-1, 1999.

H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu, YAGP: Yet Another Graphical Password Strategy, 2008 Annual Computer Security Applications Conference (ACSAC), pp.121-129, 2008.
DOI : 10.1109/ACSAC.2008.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.653.2256

H. Tao and C. Adams, Pass-Go: A Proposal to Improve the Usability of Graphical Passwords, J. Network Security, vol.7, issue.2, pp.273-292, 2008.

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, Authentication using graphical passwords, Proceedings of the 2005 symposium on Usable privacy and security , SOUPS '05, pp.1-12, 2005.
DOI : 10.1145/1073001.1073002

S. Chiasson, A. Forget, R. Biddle, and P. Van-oorschot, Influencing Users Towards Better Passwords: Persuasive Cued Click-Points, BCS International Conference on People and Computers, pp.121-130, 2008.

A. Bulling, F. Alt, and A. Schmidt, Increasing the security of gaze-based cued-recall graphical passwords using saliency masks, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.3011-3020, 2012.
DOI : 10.1145/2207676.2208712

M. Mihajlov and B. Jerman-blazic, On designing usable and secure recognition-based graphical authentication mechanisms, Interacting with Computers, vol.23, issue.6, pp.582-593, 2011.
DOI : 10.1016/j.intcom.2011.09.001

J. Nicholson, P. Dunphy, L. Coventry, P. Briggs, and P. A. Olivier, A security assessment of tiles, Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, CHI EA '12, pp.1967-1972, 2012.
DOI : 10.1145/2212776.2223737

A. Forget, S. Chiasson, P. Van-oorschot, and R. Biddle, Improving text passwords through persuasion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.1-12, 2008.
DOI : 10.1145/1408664.1408666

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.6173

N. Wright, A. Patrick, and R. Biddle, Do you see your password?, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, 2012.
DOI : 10.1145/2335356.2335367

C. Kuo, S. Romanosky, and L. Cranor, Human selection of mnemonic phrase-based passwords, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.67-78, 2006.
DOI : 10.1145/1143120.1143129

J. A. Halderman, B. Waters, and E. Felten, A convenient method for securely managing passwords, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.471-479, 2005.
DOI : 10.1145/1060745.1060815

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3756

S. Chiasson, P. C. Van-oorschot, and R. A. Biddle, Usability Study and Critique of Two Password Managers, USENIX Security Symposium, pp.1-16, 2006.

P. Brusilovsky, A. Kobsa, and W. Nejdl, The Adaptive Web: Methods and Strategies of Web Personalization, 2007.
DOI : 10.1007/978-3-540-72079-9

A. Paivio, Mind and Its Evolution: A Dual Coding Theoretical Approach, 2006.

A. Paivio and K. Csapo, Picture superiority in free recall: Imagery or dual coding?, Cognitive Psychology, vol.5, issue.2, pp.176-206, 1973.
DOI : 10.1016/0010-0285(73)90032-7

J. R. Anderson, Cognitive Psychology and its Implications: Seventh Edition, 2009.

B. A. Ally and A. E. Budson, The worth of pictures: Using high density event-related potentials to understand the memorial power of pictures and the dynamics of recognition memory, NeuroImage, vol.35, issue.1, pp.378-395, 2007.
DOI : 10.1016/j.neuroimage.2006.11.023

T. F. Brady, T. Konkle, G. A. Alvarez, and A. Oliva, Visual long-term memory has a massive storage capacity for object details, Proceedings of the National Academy of Sciences, vol.43, issue.6, pp.14325-14329, 2008.
DOI : 10.1016/j.neuropsychologia.2004.09.014

URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2533687

J. M. Oates and L. M. Reder, Memory for Pictures: Sometimes a Picture is not Worth a Single Word. Successful Remembering and Successful Forgetting: A Festschrift in Honor of Robert A, Bjork. J, pp.447-462, 2010.

E. K. Robertson and S. Köhler, Insights from child development on the relationship between episodic and semantic memory, Neuropsychologia, vol.45, issue.14, pp.3178-3189, 2007.
DOI : 10.1016/j.neuropsychologia.2007.06.021

R. Riding and I. Cheema, Cognitive Styles???an overview and integration, Educational Psychology, vol.47, issue.3-4, pp.193-215, 1991.
DOI : 10.1037/13128-000

E. Peterson, S. Rayner, and S. Armstrong, Researching the psychology of cognitive style and learning style: Is there really a future?, Learning and Individual Differences, vol.19, issue.4, pp.518-523, 2009.
DOI : 10.1016/j.lindif.2009.06.003

O. Blazhenkova and M. Kozhevnikov, The new object-spatial-verbal cognitive style model: Theory and measurement, Applied Cognitive Psychology, vol.2, issue.5, pp.638-663, 2009.
DOI : 10.1002/acp.1473

E. Peterson, I. Deary, and E. Austin, A new measure of Verbal???Imagery Cognitive Style: VICS, Personality and Individual Differences, vol.38, issue.6, pp.1269-1281, 2005.
DOI : 10.1016/j.paid.2004.08.009

R. Riding, Cognitive Styles Analysis. Learning and Training Technology, 2001.

M. Kozhevnikov, Cognitive styles in the context of modern psychology: Toward an integrated framework of cognitive style., Psychological Bulletin, vol.133, issue.3, pp.464-481, 2007.
DOI : 10.1037/0033-2909.133.3.464

L. P. Mcavinue and I. H. Robertson, Measuring Visual Imagery Ability: A Review, Imagination, Cognition and Personality, vol.26, issue.3, pp.191-211, 2007.
DOI : 10.2190/3515-8169-24J8-7157

K. Kinley, D. Tjondronegoro, and H. Partridge, Web searching interaction model based on user cognitive styles, Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction, OZCHI '10, pp.340-343, 2010.
DOI : 10.1145/1952222.1952296

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.670.4126

N. Tavassoli, Temporal and Associative Memory in Chinese and English, Journal of Consumer Research, vol.26, issue.2, pp.170-181, 1999.
DOI : 10.1086/209558

C. Herley and P. Van-oorschot, A Research Agenda Acknowledging the Persistence of Passwords, IEEE Security & Privacy Magazine, vol.10, issue.1, pp.28-36, 2012.
DOI : 10.1109/MSP.2011.150