R. Abu-salma, A. Sasse, J. Bonneau, A. Danilova, A. Naiakshina et al., Obstacles to the adoption of secure communication tools, Security and Privacy (SP), 2017 IEEE Symposium on (SP17), 2017.

K. Ermoshina, H. Halpin, and F. Musiani, Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols, European Workshop on Usable Security, 2017.

M. Green and M. Smith, Developers are Not the Enemy!: The Need for Usable Security APIs, IEEE Security & Privacy, vol.14, issue.5, pp.40-46, 2016.

N. Kobeissi, K. Bhargavan, and B. Blanchet, Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, IEEE European Symposium on Security and Privacy, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575923

N. Oudshoorn and T. Pinch, How users matter: The co-construction of users and technology, 2005.

S. Schröder, M. Huber, D. Wind, and C. Rottermanner, When Signal hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging, European Workshop on Usable Security, 2016.

C. Troncoso, M. Isaakidis, G. Danezis, and H. Halpin, Systematizing decentralization and privacy: Lessons from 15 years of research and deployments, Proceedings on Privacy Enhancing Technologies, vol.2017, pp.404-426, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673295

N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl et al., SoK: Secure Messaging, IEEE Symposium on Security and Privacy (SP), pp.232-249, 2015.

M. E. Zurko and R. Simon, User-centered security, Proceedings of the Workshop on New Security Paradigms, pp.27-33, 1996.