Tablet and Smartphone Accessibility Features in the Low Vision Rehabilitation, Neuro-Ophthalmology, vol.106, issue.10, p.53, 2014. ,
DOI : 10.1016/0042-6989(87)90028-9
The interaction experiences of visually impaired people with assistive technology: A case study of smartphones, International Journal of Industrial Ergonomics, vol.55, pp.22-33, 2016. ,
DOI : 10.1016/j.ergon.2016.07.002
Usage of Accessibility Options for the iPhone and iPad in a Visually Impaired Population, Seminars in Ophthalmology, vol.5, issue.1, pp.163-171, 2017. ,
DOI : 10.3109/01658107.2013.874448
An empirical investigation of the situationally-induced impairments experienced by blind mobile device users, Proceedings of the 13th Web for All Conference on, W4A '16, pp.1-21, 2016. ,
DOI : 10.1145/2556288.2557085
PassChords, Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility, ASSETS '12, pp.159-166 ,
DOI : 10.1145/2384916.2384945
Freedom to roam, Proceeding of the eleventh international ACM SIGACCESS conference on Computers and accessibility, ASSETS '09, pp.115-122, 2009. ,
DOI : 10.1145/1639642.1639663
Accessibility of Android-Based Mobile Devices: A Prototype to Investigate Interaction with Blind Users, Proceedings of the 13th international conference on Computers Helping People with Special Needs -Volume Part II, pp.607-614, 2012. ,
DOI : 10.1007/978-3-642-31534-3_89
Interacting with mobile devices via Voice- Over: usability and accessibility issues, Proceedings of the 24th Australian Computer-Human Interaction Conference, pp.339-348, 2012. ,
Disabled Population by type of Disability Age and Sex -C20 Table (India & States/UTs -District Level), 2011. ,
Measuring user confidence in smartphone security and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, p.1, 2012. ,
DOI : 10.1145/2335356.2335358
Are You Ready to Lock?, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.750-761, 2014. ,
DOI : 10.1146/annurev.eg.01.110176.003213
Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, 2012. ,
DOI : 10.1145/2335356.2335360
Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments, J. Educ. Technol. Soc, vol.19, pp.28-40, 2016. ,
Can i borrow your phone?, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.1647-1650, 2009. ,
DOI : 10.1145/1518701.1518953
Understanding Users' Requirements for Data Protection in Smartphones, 2012 IEEE 28th International Conference on Data Engineering Workshops, pp.228-235, 2012. ,
DOI : 10.1109/ICDEW.2012.83
Know your enemy, Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, MobileHCI '13, pp.271-280, 2013. ,
DOI : 10.1145/2493190.2493223
Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol.34, pp.47-66, 2013. ,
DOI : 10.1016/j.cose.2012.11.004
Understanding of the Behaviour of Android Smartphone Users in Cameroon: Application of the Security, Open J. Inf. Secur. Appl, vol.2014, pp.9-20, 2014. ,
Privacy Concerns and Behaviors of People with Visual Impairments, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.3523-3532, 2015. ,
DOI : 10.1145/2556288.2557085
Usability Issues of Smart Phone Applications: For Visually Challenged People, World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng, vol.8, pp.760-767, 2014. ,
I'm Stuck! " : A Contextual Inquiry of People with Visual Impairments in Authentication, Eleventh Symposium On Usable Privacy and Security, pp.151-168, 2015. ,
Usable Mobile Security, Proceedings of the 8th international conference on Distributed Computing and Internet Technology, pp.1-6, 2012. ,
DOI : 10.1145/1284680.1284685
On the need for different security methods on mobile phones, Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI '11, pp.465-473, 2011. ,
DOI : 10.1145/2037373.2037442
Why mobile security is not like traditional security, 2011. ,
Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-3, 2012. ,
DOI : 10.1145/2335356.2335360
Exploring Internet Security Perceptions and Practices in Urban Ghana, In: SOUPS. pp, pp.129-142, 2014. ,
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods, PLOS ONE, vol.33, issue.12, p.173284, 2017. ,
DOI : 10.1371/journal.pone.0173284.t002
URL : https://doi.org/10.1371/journal.pone.0173284
ISO 9241-11 revised: What have we learnt about usability since, International Conference on Human-Computer Interaction, pp.143-151, 1998. ,
DOI : 10.1007/978-3-319-20901-2_13
Ergonomics of human-system interaction ? Part 11: Usability: Definitions and concepts, https, pp.9241-9252 ,
Usability goals setting tool In: 4th Workshop on Software and Usability Engineering Cross-Pollination: Usability Evaluation of Advanced Interfaces, 2009. ,
Do Teams Achieve Usability Goals? Evaluating Goal Achievement with Usability Goals Setting Tool, pp.313-330, 2011. ,
DOI : 10.1007/978-3-642-23774-4_26
URL : https://hal.archives-ouvertes.fr/hal-01590579
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
DOI : 10.1109/PROC.1975.9939
Making security usable, http://reports-archive .adm.cs.cmu, 2004. ,
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, Proceedings of the 8th Conference on USENIX Security Symposium, 1999. ,
Contextual design, interactions, vol.6, issue.1, 1998. ,
DOI : 10.1145/291224.291229
Alternative Keyboard Layouts for Improved Password Entry and Creation on Mobile Devices, Presented at the Eleventh Symposium On Usable Privacy and Security ,
Honey, I shrunk the keys, Proceedings of the 8th Nordic Conference on Human-Computer Interaction Fun, Fast, Foundational, NordiCHI '14, pp.461-470, 2014. ,
DOI : 10.1016/j.intcom.2011.03.007
The Anatomy of Smartphone Unlocking, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.4806-4817, 2016. ,
DOI : 10.1109/ICNP.2014.43
Vibro-Tactile Enrichment Improves Blind User Interaction with Mobile Touchscreens, IFIP Conference on Human-Computer Interaction, pp.641-648, 2013. ,
DOI : 10.1007/978-3-642-40483-2_45
URL : https://hal.archives-ouvertes.fr/hal-01497468
A pilot study on the security of pattern screen-lock methods and soft side channel attacks, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.1-6, 2013. ,
DOI : 10.1145/2462096.2462098
On User Choice for Android Unlock Patterns, Proceedings 1st European Workshop on Usable Security, p.2016, 2016. ,
DOI : 10.14722/eurousec.2016.23001
Patterns in the wild, Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, MobileHCI '13, p.261, 2013. ,
DOI : 10.1145/2493190.2493231
Password sharing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.895-904, 2007. ,
DOI : 10.1145/1240624.1240759
A User Study About Security Practices of Less-Literate Smartphone Users, 8th International Conference on Intelligent Human Computer Interaction, pp.209-216, 2016. ,
DOI : 10.1037/0003-066X.52.10.1051
Revocable Fingerprint Biotokens: Accuracy and Security Analysis, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.1-8, 2007. ,
DOI : 10.1109/CVPR.2007.383110
Input finger detection for nonvisual touch screen text entry in Perkinput, Proceedings of Graphics Interface 2012, pp.121-129, 2012. ,
Playing with geometry, Proceedings of the 11th Biannual Conference on Italian SIGCHI Chapter, CHItaly 2015, pp.134-137, 2015. ,
DOI : 10.1016/j.actpsy.2008.01.006
Designing a text entry multimodal keypad for blind users of touchscreen mobile phones, Proceedings of the 16th international ACM SIGACCESS conference on Computers & accessibility, ASSETS '14, pp.131-136, 2014. ,
DOI : 10.1145/2661334.2661354
From Tapping to Touching: Making Touch Screens Accessible to Blind Users, IEEE Multimedia, vol.15, issue.4, pp.48-50, 2008. ,
DOI : 10.1109/MMUL.2008.88
Slide rule, Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibility, Assets '08, pp.73-80, 2008. ,
DOI : 10.1145/1414471.1414487
Access overlays, Proceedings of the 24th annual ACM symposium on User interface software and technology, UIST '11, pp.273-282, 2011. ,
DOI : 10.1145/2047196.2047232
Designing auditory cues to enhance spoken mathematics for visually impaired users, Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility, ASSETS '10, pp.75-82, 2010. ,
DOI : 10.1145/1878803.1878819
Improving the usability of speech-based interfaces for blind users, Proceedings of the second annual ACM conference on Assistive technologies , Assets '96, pp.124-130, 1996. ,
DOI : 10.1145/228347.228367