S. Arora, National e-ID card schemes: A European overview, Information Security Technical Report, vol.13, issue.2, pp.46-53, 2008.
DOI : 10.1016/j.istr.2008.08.002

J. Aussel, Smart Cards and Digital Security, Computer Network Security, vol.1, pp.42-56, 2007.
DOI : 10.1007/978-3-540-73986-9_4

M. K. Baldwin and B. M. Malone, Utilizing smart cards for authentication and compliance tracking in a diabetes case management system, Proceedings of the 46th Annual Southeast Regional Conference on XX, ACM-SE 46, pp.521-522, 2008.
DOI : 10.1145/1593105.1593246

J. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung, Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006.
DOI : 10.1145/1180405.1180427

C. Braz and J. M. Robert, Security and usability, Proceedings of the 18th international conference on Association Francophone d'Interaction Homme-Machine , IHM '06, pp.199-203, 2006.
DOI : 10.1145/1132736.1132768

D. Florencio and C. Herley, A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.657-666, 2007.
DOI : 10.1145/1242572.1242661

C. Herley, So long, and no thanks for the externalities, Proceedings of the 2009 workshop on New security paradigms workshop, NSPW '09, 2009.
DOI : 10.1145/1719030.1719050

P. G. Inglesant and M. A. Sasse, The true cost of unusable password policies, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.383-392, 2010.
DOI : 10.1145/1753326.1753384

C. S. Irwin and D. C. Taylor, Identity, credential, and access management at NASA, from Zachman to attributes, Proceedings of the 8th Symposium on Identity and Trust on the Internet, IDtrust '09, pp.1-14, 2009.
DOI : 10.1145/1527017.1527019

M. Jakobsson, E. Shi, P. Golle, and R. Chow, Implicit Authentication for Mobile Devices, proceedings of USENIX Workshop on HotSec, 2009.

P. A. Karger, Privacy and security threat analysis of the federal employee personal identity verification (PIV) program, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.114-121, 2006.
DOI : 10.1145/1143120.1143135

S. J. Murdoch, S. Drimer, R. Anderson, and M. Bond, Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, pp.433-446, 2010.
DOI : 10.1109/SP.2010.33

O. 'gorman and L. , Comparing Passwords, Tokens, and Biometrics for User Authentication, Proc. IEEE 2003, pp.2019-2040, 2003.

R. W. Proctor, M. C. Lien, G. Salvendy, and E. E. Schultz, A Task Analysis of Usability in Third-Party Authentication, Information Security Bulletin, vol.5, issue.3, pp.49-56, 2000.

M. A. Sasse, S. Brostoff, and D. Weirich, Transforming the 'Weakest Link' - a Human-Computer Interaction Approach to Usable and Effective security, BT Technology Journal, vol.19, issue.3, pp.122-131, 2001.
DOI : 10.1049/PBBT004E_ch15

M. A. Sasse, Usability and Trust in Information Systems. Cyber Trust & Crime Prevention Project, 2004.

S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, The Emperor's New Security Indicators, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.51-65, 2007.
DOI : 10.1109/SP.2007.35

S. Schechter, S. Egelman, and R. W. Reeder, It's not what you know, but who you know: a social approach to last-resort authentication, Proc. ACM CHI 2009, 1983.
DOI : 10.1145/1572532.1572581

D. D. Strouble, G. M. Schechtman, and A. S. Alsop, Productivity and Usability Effects of Using a Two-Factor Security System, proceedings of SAIS, pp.196-201, 2009.

W. C. Summers and E. Bosworth, Password policy: the good, the bad, and the ugly, proceedings of WISICT 2004, pp.1-6, 2004.

C. S. Weir, G. Douglas, T. Richardson, J. , and M. , Usable security: User preferences for authentication methods in eBanking and the effects of experience, Interacting with Computers, vol.22, issue.3, pp.153-164, 2010.
DOI : 10.1016/j.intcom.2009.10.001