Z. Yu, H. N. Liang, C. Fleming, and K. L. Man, An exploration of usable authentication mechanisms for virtual reality systems, IEEE APCCAS 2016, pp.458-460, 2016.

F. Roesner, T. Kohno, and D. Molnar, Security and privacy for augmented reality systems, Commun. ACM, vol.57, pp.88-96, 2014.

C. George, M. Khamis, E. V. Zezschwitz, M. Burger, H. Schmidt et al., Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality, 2017.

D. K. Yadav, B. Ionascu, S. V. Ongole, A. Roy, and N. Memon, Design and analysis of shoulder surfing resistant PIN based authentication mechanisms on google glass, Financial Cryptography and Data Security, 2015.

S. Schneegaß, Y. Oualil, and A. Bulling, SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull CHI '16, pp.1379-1384, 2016.

R. E. Mayer and L. J. Massa, Three facets of visual and verbal learners: cognitive ability, cognitive style, and learning preference, J. Edu. Psychol, vol.95, issue.4, pp.833-846, 2003.

R. Riding and I. Cheema, Cognitive styles -an overview and integration, Edu. Psychol, vol.11, issue.3-4, pp.193-215, 1991.

H. A. Witkin, C. A. Moore, D. R. Goodenough, and P. W. Cox, Field-dependent and fieldindependent cognitive styles and their educational implications, Res. Bull. Ser, issue.2, pp.1-64, 1975.

C. Katsini, C. Fidas, G. Raptis, M. Belk, G. Samaras et al., Influences of human cognition and visual behavior on password security during picture password composition, ACM SIGCHI Human Factors in Computing Systems (CHI 2018), p.87, 2018.

M. Belk, C. Fidas, C. Katsini, N. Avouris, and G. Samaras, Effects of Human Cognitive Differences on Interaction and Visual Behavior in Graphical User Authentication. INTERACT (3) 2017, pp.287-296, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01717203

M. Belk, P. Germanakos, C. Fidas, and G. Samaras, A personalisation method based on human factors for improving usability of user authentication tasks. User Modeling, Adaptation, and Personalization, pp.13-24, 2014.

G. Raptis, C. A. Fidas, and N. Avouris, Effects of mixed-reality on players' behaviour and immersion in a cultural tourism game: A cognitive processing perspective, International Journal of Human-Computer Studies, pp.69-79, 2018.

H. Bellini, W. Chen, M. Sugiyama, M. Shin, S. Alam et al., Virtual & Augmented Reality: Understanding the Race for the Next Computing Platform, 2016.

C. Angeli, N. Valanides, and P. Kirschner, Field dependence-independence and instructional-design effects on learners' performance with a computer-modeling tool, Computers in Human Behavior, vol.25, issue.6, pp.1355-1366, 2009.

J. Hong, M. Hwang, K. Tam, Y. Lai, and L. Liu, Effects of cognitive style on digital jigsaw puzzle performance: A GridWare analysis, Comp. in Hum. Beh, vol.28, issue.3, pp.920-928, 2012.

P. K. Oltman, E. Raskin, and H. A. Witkin, , 1971.

J. J. Johnson, S. Seixeiro, Z. Pace, G. Van-der-bogert, S. Gilmour et al., Picture gesture authentication, 2014.

G. Hadjidemetriou, M. Belk, C. Fidas, and A. Pitsillides, Picture passwords in mixed reality: Implementation and evaluation, ACM CHI '19 Extended Abstracts, 2019.

M. Kassner, W. Patera, and A. Bulling, Pupil: an open source platform for pervasive eye tracking and mobile gaze-based interaction, ACM UbiComp, pp.1151-1160, 2014.

Z. Zhao, G. Ahn, J. Seo, and H. Hu, On the security of picture gesture authentication, USENIX Security 2013. USENIX Association, pp.383-398, 2013.

Z. Zhao, G. Ahn, and H. Hu, Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation, ACM Trans. Inf. Syst. Secur, vol.17, 2015.

R. Biddle, S. Chiasson, and P. Van-oorschot, Graphical passwords: Learning from the first twelve years, ACM Computing Surveys, vol.44, issue.4, p.41, 2012.

D. Liu, B. Dong, X. Gao, and H. Wang, Exploiting eye tracking for smartphone authentication, Applied Cryptography and Network Security, pp.457-477, 2016.

M. Belk, C. Fidas, P. Germanakos, and G. Samaras, The interplay between humans, technology and user authentication: a cognitive processing perspective, Computers in Human Behavior, vol.76, pp.184-200, 2017.

K. Krejtz, Gaze Transition Entropy. ACM Trans. on Appl. Perc, vol.13, pp.1-20, 2015.

J. K. Davis, Educational implications of field dependence-independence, pp.149-175, 1991.

S. Messick, The matter of style: Manifestations of personality in cognition, learning, and teaching, 1993.

C. Katsini, G. E. Raptis, C. Fidas, and N. Avouris, Towards gaze-based quantification of the security of graphical authentication schemes, ACM ETRA '18, 2018.

A. Bogle, ebay launches a world-first virtual reality department store, 2016.

Z. Medenica, L. Kun, T. Paek, and O. Palinko, Augmented reality vs. street views: a driving simulator study comparing two emerging navigation aids, MobileHCI ', vol.11, pp.265-274, 2011.

S. Kim and A. K. Dey, Simulated augmented reality windshield display as a cognitive mapping aid for elder driver navigation, ACM CHI '09, pp.133-142, 2009.

A. Constantinides, M. Belk, C. Fidas, and G. Samaras, On cultural-centered graphical passwords: Leveraging on users' cultural experiences for improving password memorability, ACM UMAP, vol.18, pp.245-249, 2018.

M. Belk, A. Pamboris, C. Fidas, C. Katsini, N. Avouris et al., Sweetspotting security and usability for intelligent graphical authentication mechanisms, ACM WI '17, pp.252-259, 2017.

C. Katsini, C. Fidas, G. Raptis, M. Belk, G. Samaras et al., Eye gazedriven prediction of cognitive differences during graphical password composition, ACM IUI '17, pp.147-152, 2018.