A. Adams, M. A. Sasse, and P. Lunt, Making Passwords Secure and Usable, Proc. HCI, pp.1-19, 1997.
DOI : 10.1007/978-1-4471-3601-9_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8977

A. Adams and M. A. Sasse, Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999.
DOI : 10.1145/322796.322806

S. Riley, Password Security: What Users Know and What They Actually Do, Usability News, vol.8, p.1, 2006.

R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek et al., Encountering stronger password requirements, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pp.1-220, 2010.
DOI : 10.1145/1837110.1837113

S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer et al., Of passwords and people, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2595-2604, 2011.
DOI : 10.1145/1978942.1979321

R. Proctor, M. Lien, K. Vu, E. Schultz, and G. Salvendy, Improving computer security for authentication of users: Influence of proactive password restrictions, Behavior Research Methods, Instruments, & Computers, vol.4, issue.2, pp.163-169, 2002.
DOI : 10.3758/BF03195438

M. Weir, S. Aggarwal, M. Collins, and H. Stern, Testing metrics for password creation policies by attacking large sets of revealed passwords, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.162-175, 2010.
DOI : 10.1145/1866307.1866327

J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012.
DOI : 10.1109/SP.2012.49