Graphical passwords, ACM Computing Surveys, vol.44, issue.4, 2012. ,
DOI : 10.1145/2333112.2333114
Picture superiority in free recall: Imagery or dual coding? Cognitive Psychology, pp.176-206, 1973. ,
On designing usable and secure recognition-based graphical authentication mechanisms, Interacting with Computers, vol.63, issue.7, pp.582-593, 2011. ,
DOI : 10.1016/j.ijhcs.2005.04.010
The design and analysis of graphical passwords, Proceedings of the USENIX Security Symposium USENIX Association, 1999. ,
YAGP: Yet Another Graphical Password Strategy, 2008 Annual Computer Security Applications Conference (ACSAC), pp.121-129, 2008. ,
DOI : 10.1109/ACSAC.2008.19
URL : http://ima.ac.uk/papers/gao2008.pdf
Pass-Go: A proposal to improve the usability of graphical passwords, Network Security, vol.7, issue.2, pp.273-292, 2008. ,
Authentication using graphical passwords, Proceedings of the 2005 symposium on Usable privacy and security , SOUPS '05, pp.1-12, 2005. ,
DOI : 10.1145/1073001.1073002
Influencing users towards better passwords: Persuasive cued click-points, Proceedings of the Conference on People and Computers, pp.121-130, 2008. ,
DejaVu: A user study using images for authentication, Proceedings of the USENIX Security Symposium, USENIX Association, 2000. ,
Memory retrieval and graphical passwords, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, 2013. ,
DOI : 10.1145/2501604.2501619
URL : http://cups.cs.cmu.edu/soups/2013/proceedings/a15_Stobert.pdf
Age-related performance issues for PIN and face-based authentication systems, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, pp.323-332, 2013. ,
DOI : 10.1145/2470654.2470701
Investigating User Behavior for Authentication Methods, ACM Transactions on Accessible Computing, vol.4, issue.4, 2013. ,
DOI : 10.1145/2493171.2493173
Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms, Proceedings of the Conference on Human-Computer Interaction, pp.442-459, 2013. ,
DOI : 10.1007/978-3-642-40477-1_27
URL : https://hal.archives-ouvertes.fr/hal-01504900
A Personalized User Authentication Approach Based on Individual Differences in Information Processing, Interacting with Computers, vol.27, issue.6, pp.706-723, 2015. ,
DOI : 10.1057/ejis.2009.9
A Comprehensive Study of the Usability of Multiple Graphical Passwords, Proceedings of the Conference on Human-Computer Interaction, pp.424-441, 2013. ,
DOI : 10.1007/978-3-642-40477-1_26
URL : https://hal.archives-ouvertes.fr/hal-01504899
A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009. ,
DOI : 10.1145/1518701.1518837
Use Your Illusion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.35-45, 2008. ,
DOI : 10.1145/1408664.1408670
Security through a different kind of obscurity, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2055-2064, 2011. ,
DOI : 10.1145/1978942.1979242
Field-dependent and field-independent cognitive styles and their educational implications, Educational Research, vol.47, issue.1, pp.1-64, 1977. ,
DOI : 10.2307/1169967
Field dependence???independence and instructional-design effects on learners??? performance with a computer-modeling tool, Computers in Human Behavior, vol.25, issue.6, pp.1355-1366, 2009. ,
DOI : 10.1016/j.chb.2009.05.010
Effects of cognitive style on digital jigsaw puzzle performance: A GridWare analysis, Computers in Human Behavior, vol.28, issue.3, pp.920-928, 2012. ,
DOI : 10.1016/j.chb.2011.12.012
Field dependence???independence as visuospatial and executive functioning in working memory: implications for instructional systems design and research, Educational Technology Research and Development, vol.17, issue.1, pp.99-114, 2010. ,
DOI : 10.2190/8AVP-REQ0-HAHC-1YJH
A manual for the embedded figures test. Palo Alto, CA: Consulting Psychologists Press. 25. Tobii Pro Glasses 2. Accessed http://www.tobiipro.com/product-listing/tobii-pro-glasses-2/#Specifications 26 R: A language and environment for statistical computing. R Foundation for Statistical Computing, R Core Team, 1971. ,
Fitting linear mixed-effects models using lme4, Journal of Statistical Software, vol.67, issue.1, pp.1-48, 2015. ,
dunn.test: Dunn's Test of Multiple Comparisons Using Rank Sums. R package version 1.3.1, 2015. ,
The phonetic profile of Korean formal and informal speech registers, Journal of Phonetics, vol.40, issue.6, pp.808-815, 2012. ,
DOI : 10.1016/j.wocn.2012.08.006
Influences of Users' Cognitive Strategies on Graphical Password Composition, Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems , CHI EA '17, pp.2698-2705, 2017. ,
DOI : 10.1002/j.2333-8504.1975.tb01065.x
Using Eye Gaze Data and Visual Activities to Infer Human Cognitive Styles, Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization , UMAP '17, 2017. ,
DOI : 10.1145/3027063.3053217
The interplay between humans, technology and user authentication: A cognitive processing perspective, Computers in Human Behavior, vol.76, 2017. ,
DOI : 10.1016/j.chb.2017.06.042
Sweetspotting security and usability for intelligent graphical authentication mechanisms, Proceedings of the Conference on Web Intelligence, 2017. ,
DOI : 10.1145/3106426.3106488