S. Egelman, S. Jain, R. S. Portnoff, K. Liao, S. Consolvo et al., Are You Ready to Lock?, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.750-761, 2014.
DOI : 10.1146/annurev.eg.01.110176.003213

M. Harbach, E. Von-zezschwitz, A. Fichtner, A. De-luca, and M. Smith, It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception, Proc. SOUPS, pp.213-230, 2014.

V. Zezschwitz, E. Dunphy, P. De-luca, and A. , Patterns in the wild, Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, MobileHCI '13, pp.261-270, 2013.
DOI : 10.1145/2493190.2493231

J. Bonneau, S. Preibusch, and R. Anderson, A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs, Proc. FC '12, pp.25-40, 2012.
DOI : 10.1007/978-3-642-32946-3_3

F. Schaub, M. Walch, B. Könings, and M. Weber, Exploring the design space of graphical passwords on smartphones, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, p.11, 2013.
DOI : 10.1145/2501604.2501615

J. A. Bargas-avila and K. Hornbaek, Old wine in new bottles or novel challenges, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2689-2698, 2011.
DOI : 10.1145/1978942.1979336

P. K. Novak, J. Smailovi´csmailovi´c, B. Sluban, and I. Mozeti?, Sentiment of emojis, PloS one, vol.10, issue.0144, p.296, 2015.

M. Harbach, A. De-luca, N. Malkin, and S. Egelman, Keep on Lockin' in the Free World, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.4823-4827, 2016.
DOI : 10.1145/2493190.2493231

O. 'gorman and L. , Comparing passwords, tokens, and biometrics for user authentication, Proceedings of the IEEE, vol.91, issue.12, pp.2021-2040, 2003.
DOI : 10.1109/JPROC.2003.819611

J. Yan, Password memorability and security: empirical results, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.25-31, 2004.
DOI : 10.1109/MSP.2004.81

H. Kim and J. H. Huh, Pin selection policies: Are they really effective? computers & security, pp.484-496, 2012.
DOI : 10.1016/j.cose.2012.02.003

R. Biddle, S. Chiasson, and P. C. Van-oorschot, Graphical passwords, ACM Computing Surveys, vol.44, issue.4, p.19, 2012.
DOI : 10.1145/2333112.2333114

N. Elenkov, Android Security Internals: An In-Depth Guide to Android's Security Architecture, 2015.

D. Davis, F. Monrose, and M. K. Reiter, On User Choice in Graphical Password Schemes, USENIX Security Symposium, pp.11-11, 2004.

M. Golla, D. Detering, and M. Dürmuth, EmojiAuth: Quantifying the Security of Emoji-based Authentication, Proceedings 2017 Workshop on Usable Security, 2017.
DOI : 10.14722/usec.2017.23024

L. Kraus, I. Wechsung, and S. Möller, Exploring Psychological Need Fulfillment for Security and Privacy Actions on Smartphones, Proceedings 1st European Workshop on Usable Security, 2016.
DOI : 10.14722/eurousec.2016.23009

L. Kraus, J. N. Antons, F. Kaiser, and S. Möller, User Experience in Authentication Research: A Survey, 5th ISCA/DEGA Workshop on Perceptual Quality of Systems (PQS 2016), pp.54-58, 2016.
DOI : 10.21437/PQS.2016-12

P. Cocozza, Crying with laughter: how we learned how to speak emoji. http: //www.theguardian.com/technologycrying-with- laughter-how-we-learned-how-to-speak-emoji. (accessed, pp.2017-2020, 2015.

F. Schaub, R. Deyhle, and M. Weber, Password entry usability and shoulder surfing susceptibility on different smartphone platforms, Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, MUM '12, p.13, 2012.
DOI : 10.1145/2406367.2406384

E. Stobert and R. Biddle, Memory retrieval and graphical passwords, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pp.1-1514, 2013.
DOI : 10.1145/2501604.2501619

URL : http://cups.cs.cmu.edu/soups/2013/proceedings/a15_Stobert.pdf

M. Rothenberg, emojitracker: realtime emoji use on twitter, pp.2017-2020

S. Chiasson, P. C. Oorschot, and R. Biddle, Graphical Password Authentication Using Cued Click Points, Proc. ESORICS '07, pp.359-374, 2007.
DOI : 10.1007/978-3-540-74835-9_24

URL : http://www.scs.carleton.ca/research/tech_reports/2007/download/TR-07-13.pdf

M. Hassenzahl and A. Monk, The Inference of Perceived Usability From Beauty, Human-Computer Interaction, vol.25, issue.3, pp.235-260, 2010.
DOI : 10.1080/07370024.2010.500139

M. Hassenzahl, The Thing and I: Understanding the Relationship Between User and Product, pp.31-42, 2003.
DOI : 10.1007/1-4020-2967-5_4

S. Fahl, M. Harbach, Y. Acar, and M. Smith, On the ecological validity of a password study, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, p.13, 2013.
DOI : 10.1145/2501604.2501617

I. Wechsung, K. Jepsen, F. Burkhardt, A. Köhler, and R. Schleicher, View from a distance, Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion, MobileHCI '12, pp.113-118, 2012.
DOI : 10.1145/2371664.2371686

F. Tari, A. Ozok, and S. H. Holden, A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.56-66, 2006.
DOI : 10.1145/1143120.1143128

V. I. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals, In: Soviet physics doklady, vol.10, p.707, 1966.