A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, The tangled web of password reuse, NDSS, vol.14, pp.23-26, 2014.

P. Lipa, The security risks of using "forgot my password" to manage passwords, pp.2017-2029, 2016.

N. J. Hopper and M. Blum, Secure human identification protocols, International Conference on the Theory and Application of Cryptology and Information Security, pp.52-66, 2001.

J. Blocki, M. Blum, and A. Datta, Naturally rehearsing passwords, International Conference on the Theory and Application of Cryptology and Information Security, pp.361-380, 2013.

M. Blum and S. S. Vempala, Publishable humanly usable secure password creation schemas, 3rd AAAI Conference on Human Computation and Crowdsourcing, 2015.

H. Sun, Y. Chen, and Y. Lin, oPass: A user authentication protocol resistant to password stealing and password reuse attacks, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.651-663, 2012.

J. Blocki, M. Blum, A. Datta, and S. Vempala, Towards human computable passwords, 8th Innovations in Theoretical Computer Science Conference -ITCS 2017, 2017.

U. Topkara, M. J. Atallah, and M. Topkara, Passwords decay, words endure: Secure and re-usable multiple password mnemonics, Proceedings of the 2007 ACM Symposium on Applied Computing, ser. SAC '07, pp.292-299, 2007.

. Centrify, Centrify password survey: Summary, Centrify, Tech. Rep, 2014.

. Lastpass, Psychology of passwords survey, Lastpass, Tech. Rep, 2016.

M. S. Ranak, S. Azad, M. Safwan-fathi-bin, Z. Kamal, and M. Rahman, An analysis on vulnerabilities of password retrying, 5th International Conference on Software Engineering & Computer System, 2017.

G. Stewart and D. Lacey, Death by a thousand facts: Criticising the technocratic approach to information security awareness, Information Management & Computer Security, vol.20, issue.1, pp.29-38, 2012.

J. Abawajy, User preference of cyber security awareness delivery methods, Behaviour & Information Technology, vol.33, issue.3, pp.237-248, 2014.

N. Alkaldi and K. Renaud, Why do people adopt, or reject, smartphone password managers, Proceedings of EuroUSEC, 2016.

D. Florêncio, C. Herley, and P. C. Van-oorschot, Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts, 23rd USENIX Security Symposium, pp.575-590, 2014.

F. Mwagwabi, T. Mcgill, and M. Dixon, Improving compliance with password guidelines: How user perceptions of passwords and security threats affect compliance with guidelines, 47th Hawaii International Conference on System Sciences -HICSS, vol.00, pp.3188-3197, 2014.

D. E. Kieras and S. Bovair, The role of a mental model in learning to operate a device, Cognitive Science, vol.8, issue.3, pp.255-273, 1984.

R. Shay, S. Komanduri, A. L. Durity, P. S. Huh, M. L. Mazurek et al., Can long passwords be secure and usable, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI '14, pp.2927-2936, 2014.

S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer et al., Of passwords and people: Measuring the effect of password-composition policies, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI '11, pp.2595-2604, 2011.

S. Gaw and E. W. Felten, Password management strategies for online accounts, Proceedings of the Second Symposium on Usable Privacy and Security, ser. SOUPS '06, pp.44-55, 2006.

Z. Li, W. He, D. Akhawe, and D. Song, The emperor's new password manager: Security analysis of web-based password managers, 23rd USENIX Security Symposium, pp.465-479, 2014.

N. Memon, How biometric authentication poses new challenges to our security and privacy, IEEE Signal Processing Magazine, vol.34, issue.4, pp.196-194, 2017.

B. Choudhury, P. Then, B. Issac, V. Raman, and M. Haldar, A survey on biometrics and cancelable biometrics systems, International Journal of Image and Graphics, vol.18, p.1850006, 2018.

J. Bonneau, C. Herley, P. C. Van-oorschot, and F. Stajano, The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, IEEE Symposium on Security and Privacy, pp.553-567, 2012.

C. Kuo, S. Romanosky, and L. F. Cranor, Human selection of mnemonic phrase-based passwords, Proceedings of the second symposium on Usable privacy and security, pp.67-78, 2006.

K. Lee, Four methods to create a secure password you'll actually remember, pp.2017-2029, 2014.

M. Blum and S. Vempala, The complexity of human computation: A concrete model with an application to passwords, CoRR, 2017.

S. Samadi, S. Vempala, and A. T. Kalai, Usability of humanly computable passwords, 6th AAAI Conference on Human Computation and Crowdsourcing, 2018.

N. K. Blanchard, C. Malaingre, and T. Selker, Improving security and usability with guided word choice, 34th Annual Computer Security Applications Conference -ACSAC, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01781233

P. Norvig, Natural language corpus data, pp.219-242, 2009.

L. Q. Ha, E. I. Sicilia-garcia, J. Ming, and F. J. Smith, Extension of zipf's law to words and phrases, Proceedings of the 19th International Conference on Computational Linguistics, vol.1, pp.1-6, 2002.

D. I. Eastlake, J. Schiller, and S. Crocker, Rfc4086: Randomness requirements for security, 2005.

, Amazon AWS S3 cost calculator, Amazon, pp.2017-2029, 2018.

P. Grassi, M. Garcia, and J. Fenton, NIST special publication 800-63-3, Digital Identity Guidelines, vol.1, 2017.

A. Toponce, Password cards, pp.2017-2029, 2010.

L. Spitzner, Time for password expiration to die, 2019.

H. Habib, P. E. Naeini, S. Devlin, M. Oates, C. Swoopes et al., User behaviors and attitudes under password expiration policies, Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), pp.13-30, 2018.

N. K. Blanchard, X. Coquand, and T. Selker, Moving to client-sided hashing for online authentication, Workshop on Socio-Technical Aspects in Security and Trust -STAST, 2019.

G. A. Miller, The magical number seven, plus or minus two: some limits on our capacity for processing information, Psychological review, vol.63, issue.2, p.81, 1956.

E. Blanchard, Usability: low tech, high security, 2019.
URL : https://hal.archives-ouvertes.fr/tel-02446324