A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, Practicality of accelerometer side channels on smartphones, Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, pp.41-50, 2012.

S. Brostoff and M. A. Sasse, Are passfaces more usable than passwords? a field trial investigation, People and Computers XIVUsability or Else!, pp.405-424, 2000.

R. Dhamija and A. Perrig, Deja vu-a user study: Using images for authentication, USENIX Security Symposium, vol.9, pp.4-4, 2000.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pp.1-6, 2010.

A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11, pp.3-14, 2011.

E. Hayashi, R. Dhamija, N. Christin, P. , and A. , Use your illusion: secure authentication usable anywhere, Proceedings of the 4th symposium on Usable privacy and security, pp.35-45, 2008.

I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, R. et al., The design and analysis of graphical passwords, 1999.

E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang, Accessory: Password inference using accelerometers on smartphones, Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile '12, vol.9, pp.1-9, 2012.

K. Renaud, P. Mayer, M. Volkamer, and J. Maguire, Are graphical authentication mechanisms as strong as passwords?, Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on, pp.837-844, 2013.

P. Salembier, M. Zouinar, R. Héron, C. Mathias, G. Lorant et al., Experimental studies of a graphical authentication system based on semantic categorisation, Actes de la28ì eme conférence francophone sur l'Interaction Homme-Machine, pp.134-143, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01383871

L. Simon and R. Anderson, Pin skimmer: Inferring pins through the camera and microphone, Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM '13, pp.67-78, 2013.

A. Stavrou, A. Benameur, J. , and R. , All your sms and contacts belong to adups and others, Proceedings of the Black Hat USA, 2017.

X. Suo, Y. Zhu, and G. S. Owen, Graphical passwords: A survey, Computer security applications conference, 21st annual, p.10, 2005.

H. Tao and C. Adams, Pass-go: A proposal to improve the usability of graphical passwords, IJ Network Security, vol.7, issue.2, pp.273-292, 2008.

S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, M. et al., Passpoints: Design and longitudinal evaluation of a graphical password system, International journal of human-computer studies, vol.63, issue.12, pp.102-127, 2005.

Z. Xu, K. Bai, and S. Zhu, Taplogger: Inferring user inputs on smartphone touchscreens using onboard motion sensors, Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pp.113-124, 2012.

Q. Yue, Z. Ling, X. Fu, B. Liu, W. Yu et al., My google glass sees your passwords! Proceedings of the Black Hat USA, 2014.

M. Zouinar, C. Mathias, G. Lorant, and J. P. Wary, Evaluation ergonomique d'un système d'authentification graphique, 2016.