R. Biddle, S. Chiasson, and P. Van-oorschot, Graphical passwords, ACM Computing Surveys, vol.44, issue.4, 2012.
DOI : 10.1145/2333112.2333114

A. Paivio and K. Csapo, Picture superiority in free recall: Imagery or dual coding? Cognitive Psychology, pp.176-206, 1973.

M. Mihajlov and B. Jerman-blazic, On designing usable and secure recognition-based graphical authentication mechanisms, Interacting with Computers, vol.63, issue.7, pp.582-593, 2011.
DOI : 10.1016/j.ijhcs.2005.04.010

I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, The design and analysis of graphical passwords, Proceedings of the USENIX Security Symposium USENIX Association, 1999.

H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu, YAGP: Yet Another Graphical Password Strategy, 2008 Annual Computer Security Applications Conference (ACSAC), pp.121-129, 2008.
DOI : 10.1109/ACSAC.2008.19

URL : http://ima.ac.uk/papers/gao2008.pdf

H. Tao and C. Adams, Pass-Go: A proposal to improve the usability of graphical passwords, Network Security, vol.7, issue.2, pp.273-292, 2008.

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, Authentication using graphical passwords, Proceedings of the 2005 symposium on Usable privacy and security , SOUPS '05, pp.1-12, 2005.
DOI : 10.1145/1073001.1073002

S. Chiasson, A. Forget, R. Biddle, and P. Van-oorschot, Influencing users towards better passwords: Persuasive cued click-points, Proceedings of the Conference on People and Computers, pp.121-130, 2008.

R. Dhamija and A. Perrig, DejaVu: A user study using images for authentication, Proceedings of the USENIX Security Symposium, USENIX Association, 2000.

E. Stobert and R. Biddle, Memory retrieval and graphical passwords, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, 2013.
DOI : 10.1145/2501604.2501619

URL : http://cups.cs.cmu.edu/soups/2013/proceedings/a15_Stobert.pdf

J. Nicholson, L. Coventry, and P. Briggs, Age-related performance issues for PIN and face-based authentication systems, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, pp.323-332, 2013.
DOI : 10.1145/2470654.2470701

Y. Ma, J. Feng, L. Kumin, and J. Lazar, Investigating User Behavior for Authentication Methods, ACM Transactions on Accessible Computing, vol.4, issue.4, 2013.
DOI : 10.1145/2493171.2493173

M. Belk, C. Fidas, P. Germanakos, and G. Samaras, Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms, Proceedings of the Conference on Human-Computer Interaction, pp.442-459, 2013.
DOI : 10.1007/978-3-642-40477-1_27

URL : https://hal.archives-ouvertes.fr/hal-01504900

M. Belk, C. Fidas, P. Germanakos, and G. Samaras, A Personalized User Authentication Approach Based on Individual Differences in Information Processing, Interacting with Computers, vol.27, issue.6, pp.706-723, 2015.
DOI : 10.1057/ejis.2009.9

S. Chowdhury, R. Poet, and L. Mackenzie, A Comprehensive Study of the Usability of Multiple Graphical Passwords, Proceedings of the Conference on Human-Computer Interaction, pp.424-441, 2013.
DOI : 10.1007/978-3-642-40477-1_26

URL : https://hal.archives-ouvertes.fr/hal-01504899

K. Everitt, T. Bragin, J. Fogarty, and T. Kohno, A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009.
DOI : 10.1145/1518701.1518837

E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, Use Your Illusion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.35-45, 2008.
DOI : 10.1145/1408664.1408670

E. Hayashi, J. Hong, and N. Christin, Security through a different kind of obscurity, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2055-2064, 2011.
DOI : 10.1145/1978942.1979242

H. A. Witkin, C. A. Moore, D. R. Goodenough, and P. W. Cox, Field-dependent and field-independent cognitive styles and their educational implications, Educational Research, vol.47, issue.1, pp.1-64, 1977.
DOI : 10.2307/1169967

C. Angeli, N. Valanides, and P. Kirschner, Field dependence???independence and instructional-design effects on learners??? performance with a computer-modeling tool, Computers in Human Behavior, vol.25, issue.6, pp.1355-1366, 2009.
DOI : 10.1016/j.chb.2009.05.010

J. Hong, M. Hwang, K. Tam, Y. Lai, and L. Liu, Effects of cognitive style on digital jigsaw puzzle performance: A GridWare analysis, Computers in Human Behavior, vol.28, issue.3, pp.920-928, 2012.
DOI : 10.1016/j.chb.2011.12.012

K. A. Rittschof, Field dependence???independence as visuospatial and executive functioning in working memory: implications for instructional systems design and research, Educational Technology Research and Development, vol.17, issue.1, pp.99-114, 2010.
DOI : 10.2190/8AVP-REQ0-HAHC-1YJH

H. A. Witkin, P. Oltman, E. Raskin, and S. Karp, A manual for the embedded figures test. Palo Alto, CA: Consulting Psychologists Press. 25. Tobii Pro Glasses 2. Accessed http://www.tobiipro.com/product-listing/tobii-pro-glasses-2/#Specifications 26 R: A language and environment for statistical computing. R Foundation for Statistical Computing, R Core Team, 1971.

D. Bates, M. Maechler, B. Bolker, and S. Walker, Fitting linear mixed-effects models using lme4, Journal of Statistical Software, vol.67, issue.1, pp.1-48, 2015.

A. Dinno, dunn.test: Dunn's Test of Multiple Comparisons Using Rank Sums. R package version 1.3.1, 2015.

B. Winter and S. Grawunder, The phonetic profile of Korean formal and informal speech registers, Journal of Phonetics, vol.40, issue.6, pp.808-815, 2012.
DOI : 10.1016/j.wocn.2012.08.006

C. Katsini, C. Fidas, M. Belk, N. Avouris, and G. Samaras, Influences of Users' Cognitive Strategies on Graphical Password Composition, Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems , CHI EA '17, pp.2698-2705, 2017.
DOI : 10.1002/j.2333-8504.1975.tb01065.x

G. Raptis, C. Katsini, M. Belk, C. Fidas, G. Samaras et al., Using Eye Gaze Data and Visual Activities to Infer Human Cognitive Styles, Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization , UMAP '17, 2017.
DOI : 10.1145/3027063.3053217

M. Belk, C. Fidas, P. Germanakos, and G. Samaras, The interplay between humans, technology and user authentication: A cognitive processing perspective, Computers in Human Behavior, vol.76, 2017.
DOI : 10.1016/j.chb.2017.06.042

M. Belk, A. Pamboris, C. Fidas, C. Katsini, N. Avouris et al., Sweetspotting security and usability for intelligent graphical authentication mechanisms, Proceedings of the Conference on Web Intelligence, 2017.
DOI : 10.1145/3106426.3106488