D. Davis and F. Monrose, On user choice in graphical password schemes, Proceedings of the 13th USENIX Security Symposium. USENIX, 2004.

R. Dhamija and A. Perrig, D` ejá vu: a user study using images for authentication, Proceedings of the 9th conference on USENIX Security Symposium, 2000.

A. Herzberg and R. Margulies, Forcing johnny to login safely, Proceedings of the 16th Annual Symposium on Research in Computer Security (ESORICS)
DOI : 10.1007/978-3-642-23822-2_25

M. Jakobsson, L. Yang, and S. Wetzel, Quantifying the security of preferencebased authentication, DIM '08: Proceedings of the 4th ACM workshop on Digital identity management, pp.61-70, 2008.

C. Karlof, J. D. Tygar, and D. Wagner, Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009.
DOI : 10.1145/1572532.1572578

R. Margulies, Usable and phishing-resistant authentication mechanisms, 2011.

A. Rabkin, Personal knowledge questions for fallback authentication, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.13-23, 2008.
DOI : 10.1145/1408664.1408667

S. Schechter, A. J. Brush, and S. Egelman, It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions, 2009 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009.
DOI : 10.1109/SP.2009.11

R. N. Shepard, Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, vol.6, issue.1, pp.156-163, 1967.
DOI : 10.1016/S0022-5371(67)80067-7

X. Suo, Y. Zhu, and G. S. Owen, Graphical passwords: A survey, Proceedings of the 21st Annual Computer Security Applications Conference, pp.463-472, 2005.

K. L. Vu, R. W. Proctor, A. Bhargav-spantzel, B. B. Tai, J. Cook et al., Improving password security and memorability to protect personal and organizational information, International Journal of Human-Computer Studies, vol.65, issue.8, pp.65744-757, 2007.
DOI : 10.1016/j.ijhcs.2007.03.007

M. Zviran and W. J. Haga, User authentication by cognitive passwords: an empirical assessment, Proceedings of the 5th Jerusalem Conference on Information Technology, 1990. 'Next Decade in Information Technology', pp.137-144, 1990.
DOI : 10.1109/JCIT.1990.128279