D. Irvine, A. Zemke, G. Pusateri, L. Gerlach, R. Chun et al., Tablet and Smartphone Accessibility Features in the Low Vision Rehabilitation, Neuro-Ophthalmology, vol.106, issue.10, p.53, 2014.
DOI : 10.1016/0042-6989(87)90028-9

H. K. Kim, S. H. Han, J. Park, and J. Park, The interaction experiences of visually impaired people with assistive technology: A case study of smartphones, International Journal of Industrial Ergonomics, vol.55, pp.22-33, 2016.
DOI : 10.1016/j.ergon.2016.07.002

J. L. Robinson, V. B. Avery, R. Chun, G. Pusateri, and W. M. Jay, Usage of Accessibility Options for the iPhone and iPad in a Visually Impaired Population, Seminars in Ophthalmology, vol.5, issue.1, pp.163-171, 2017.
DOI : 10.3109/01658107.2013.874448

A. Abdolrahmani, R. Kuber, and A. Hurst, An empirical investigation of the situationally-induced impairments experienced by blind mobile device users, Proceedings of the 13th Web for All Conference on, W4A '16, pp.1-21, 2016.
DOI : 10.1145/2556288.2557085

S. Azenkot, K. Rector, R. Ladner, and J. Wobbrock, PassChords, Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility, ASSETS '12, pp.159-166
DOI : 10.1145/2384916.2384945

S. K. Kane, C. Jayant, J. O. Wobbrock, and R. E. Ladner, Freedom to roam, Proceeding of the eleventh international ACM SIGACCESS conference on Computers and accessibility, ASSETS '09, pp.115-122, 2009.
DOI : 10.1145/1639642.1639663

S. Chiti and B. Leporini, Accessibility of Android-Based Mobile Devices: A Prototype to Investigate Interaction with Blind Users, Proceedings of the 13th international conference on Computers Helping People with Special Needs -Volume Part II, pp.607-614, 2012.
DOI : 10.1007/978-3-642-31534-3_89

B. Leporini, M. C. Buzzi, and M. Buzzi, Interacting with mobile devices via Voice- Over: usability and accessibility issues, Proceedings of the 24th Australian Computer-Human Interaction Conference, pp.339-348, 2012.

D. Data-on, Disabled Population by type of Disability Age and Sex -C20 Table (India & States/UTs -District Level), 2011.

E. Chin, A. P. Felt, V. Sekar, and D. Wagner, Measuring user confidence in smartphone security and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, p.1, 2012.
DOI : 10.1145/2335356.2335358

S. Egelman, S. Jain, R. S. Portnoff, K. Liao, S. Consolvo et al., Are You Ready to Lock?, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.750-761, 2014.
DOI : 10.1146/annurev.eg.01.110176.003213

A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, 2012.
DOI : 10.1145/2335356.2335360

F. A. Inan, A. S. Namin, R. L. Pogrund, and K. S. Jones, Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments, J. Educ. Technol. Soc, vol.19, pp.28-40, 2016.

A. K. Karlson, A. J. Brush, and S. Schechter, Can i borrow your phone?, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.1647-1650, 2009.
DOI : 10.1145/1518701.1518953

I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov, Understanding Users' Requirements for Data Protection in Smartphones, 2012 IEEE 28th International Conference on Data Engineering Workshops, pp.228-235, 2012.
DOI : 10.1109/ICDEW.2012.83

I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov, Know your enemy, Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, MobileHCI '13, pp.271-280, 2013.
DOI : 10.1145/2493190.2493223

A. Mylonas, A. Kastania, and D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol.34, pp.47-66, 2013.
DOI : 10.1016/j.cose.2012.11.004

F. Tchakounté, P. Dayang, J. Nlong, and N. Check, Understanding of the Behaviour of Android Smartphone Users in Cameroon: Application of the Security, Open J. Inf. Secur. Appl, vol.2014, pp.9-20, 2014.

T. Ahmed, R. Hoyle, K. Connelly, D. Crandall, and A. Kapadia, Privacy Concerns and Behaviors of People with Visual Impairments, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.3523-3532, 2015.
DOI : 10.1145/2556288.2557085

A. Ashraf and A. Raza, Usability Issues of Smart Phone Applications: For Visually Challenged People, World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng, vol.8, pp.760-767, 2014.

B. Dosono, J. Hayes, and Y. Wang, I'm Stuck! " : A Contextual Inquiry of People with Visual Impairments in Authentication, Eleventh Symposium On Usable Privacy and Security, pp.151-168, 2015.

N. Asokan and C. Kuo, Usable Mobile Security, Proceedings of the 8th international conference on Distributed Computing and Internet Technology, pp.1-6, 2012.
DOI : 10.1145/1284680.1284685

N. Ben-asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-oved et al., On the need for different security methods on mobile phones, Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI '11, pp.465-473, 2011.
DOI : 10.1145/2037373.2037442

M. Jakobsson, Why mobile security is not like traditional security, 2011.

A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-3, 2012.
DOI : 10.1145/2335356.2335360

J. Chen, M. Paik, and K. Mccabe, Exploring Internet Security Perceptions and Practices in Urban Ghana, In: SOUPS. pp, pp.129-142, 2014.

M. Alsaleh, N. Alomar, and A. Alarifi, Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods, PLOS ONE, vol.33, issue.12, p.173284, 2017.
DOI : 10.1371/journal.pone.0173284.t002

URL : https://doi.org/10.1371/journal.pone.0173284

N. Bevan, J. Carter, and S. Harker, ISO 9241-11 revised: What have we learnt about usability since, International Conference on Human-Computer Interaction, pp.143-151, 1998.
DOI : 10.1007/978-3-319-20901-2_13

I. Dis, Ergonomics of human-system interaction ? Part 11: Usability: Definitions and concepts, https, pp.9241-9252

A. Joshi, Usability goals setting tool In: 4th Workshop on Software and Usability Engineering Cross-Pollination: Usability Evaluation of Advanced Interfaces, 2009.

A. Joshi and N. L. Sarda, Do Teams Achieve Usability Goals? Evaluating Goal Achievement with Usability Goals Setting Tool, pp.313-330, 2011.
DOI : 10.1007/978-3-642-23774-4_26

URL : https://hal.archives-ouvertes.fr/hal-01590579

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975.
DOI : 10.1109/PROC.1975.9939

A. Whitten, Making security usable, http://reports-archive .adm.cs.cmu, 2004.

A. Whitten and J. D. Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, Proceedings of the 8th Conference on USENIX Security Symposium, 1999.

H. Beyer and K. Holtzblatt, Contextual design, interactions, vol.6, issue.1, 1998.
DOI : 10.1145/291224.291229

E. Genco, R. Kelley, C. Vernon, and A. J. Aviv, Alternative Keyboard Layouts for Improved Password Entry and Creation on Mobile Devices, Presented at the Eleventh Symposium On Usable Privacy and Security

E. Von-zezschwitz, A. De-luca, and H. Hussmann, Honey, I shrunk the keys, Proceedings of the 8th Nordic Conference on Human-Computer Interaction Fun, Fast, Foundational, NordiCHI '14, pp.461-470, 2014.
DOI : 10.1016/j.intcom.2011.03.007

M. Harbach, A. De-luca, and S. Egelman, The Anatomy of Smartphone Unlocking, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.4806-4817, 2016.
DOI : 10.1109/ICNP.2014.43

M. C. Buzzi, M. Buzzi, B. Leporini, and M. T. Paratore, Vibro-Tactile Enrichment Improves Blind User Interaction with Mobile Touchscreens, IFIP Conference on Human-Computer Interaction, pp.641-648, 2013.
DOI : 10.1007/978-3-642-40483-2_45

URL : https://hal.archives-ouvertes.fr/hal-01497468

P. Andriotis, T. Tryfonas, G. Oikonomou, and C. Yildiz, A pilot study on the security of pattern screen-lock methods and soft side channel attacks, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.1-6, 2013.
DOI : 10.1145/2462096.2462098

M. Loge, M. Duermuth, and L. Rostad, On User Choice for Android Unlock Patterns, Proceedings 1st European Workshop on Usable Security, p.2016, 2016.
DOI : 10.14722/eurousec.2016.23001

E. Von-zezschwitz, P. Dunphy, and A. De-luca, Patterns in the wild, Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, MobileHCI '13, p.261, 2013.
DOI : 10.1145/2493190.2493231

S. Singh, A. Cabraal, C. Demosthenous, G. Astbrink, and M. Furlong, Password sharing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.895-904, 2007.
DOI : 10.1145/1240624.1240759

P. Doke, S. Lobo, A. Joshi, N. Aggarwal, V. Paul et al., A User Study About Security Practices of Less-Literate Smartphone Users, 8th International Conference on Intelligent Human Computer Interaction, pp.209-216, 2016.
DOI : 10.1037/0003-066X.52.10.1051

T. E. Boult, W. J. Scheirer, and R. Woodworth, Revocable Fingerprint Biotokens: Accuracy and Security Analysis, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.1-8, 2007.
DOI : 10.1109/CVPR.2007.383110

S. Azenkot, J. O. Wobbrock, S. Prasain, and R. E. Ladner, Input finger detection for nonvisual touch screen text entry in Perkinput, Proceedings of Graphics Interface 2012, pp.121-129, 2012.

M. C. Buzzi, M. Buzzi, B. Leporini, and C. Senette, Playing with geometry, Proceedings of the 11th Biannual Conference on Italian SIGCHI Chapter, CHItaly 2015, pp.134-137, 2015.
DOI : 10.1016/j.actpsy.2008.01.006

M. C. Buzzi, M. Buzzi, B. Leporini, and A. Trujillo, Designing a text entry multimodal keypad for blind users of touchscreen mobile phones, Proceedings of the 16th international ACM SIGACCESS conference on Computers & accessibility, ASSETS '14, pp.131-136, 2014.
DOI : 10.1145/2661334.2661354

T. Guerreiro, H. Nicolau, and J. A. Jorge, From Tapping to Touching: Making Touch Screens Accessible to Blind Users, IEEE Multimedia, vol.15, issue.4, pp.48-50, 2008.
DOI : 10.1109/MMUL.2008.88

S. K. Kane, J. P. Bigham, and J. O. Wobbrock, Slide rule, Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibility, Assets '08, pp.73-80, 2008.
DOI : 10.1145/1414471.1414487

S. K. Kane, M. R. Morris, A. Z. Perkins, D. Wigdor, R. E. Ladner et al., Access overlays, Proceedings of the 24th annual ACM symposium on User interface software and technology, UIST '11, pp.273-282, 2011.
DOI : 10.1145/2047196.2047232

E. Murphy, E. Bates, and D. Fitzpatrick, Designing auditory cues to enhance spoken mathematics for visually impaired users, Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility, ASSETS '10, pp.75-82, 2010.
DOI : 10.1145/1878803.1878819

I. J. Pitt and A. D. Edwards, Improving the usability of speech-based interfaces for blind users, Proceedings of the second annual ACM conference on Assistive technologies , Assets '96, pp.124-130, 1996.
DOI : 10.1145/228347.228367