메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 45-56

Pass-thoughts: Authenticating with our minds

Author keywords

Authentication; Passwords

Indexed keywords

COMPUTER SYSTEMS; CONSTRAINT THEORY; INTERFACES (COMPUTER); SECURITY OF DATA; SYSTEMS ANALYSIS;

EID: 33745685825     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (109)

References (65)
  • 2
    • 33745695820 scopus 로고    scopus 로고
    • M. A. Arbib, editor. The MIT Press, second edition
    • M. A. Arbib, editor. The Handbook of Brain Theory and Neural Networks, pages 178-181. The MIT Press, second edition, 2003.
    • (2003) The Handbook of Brain Theory and Neural Networks , pp. 178-181
  • 6
    • 7544230652 scopus 로고    scopus 로고
    • Robust discretization, with an application to graphical passwords
    • site accessed Jan. 12, 2004
    • J.-C. Birget, D. Hong, and N. Memon. Robust Discretization, With an Application to Graphical Passwords. Cryptology ePrint Archive, Report 2003/168, 2003. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
    • (2003) Cryptology EPrint Archive, Report , vol.2003 , Issue.168
    • Birget, J.-C.1    Hong, D.2    Memon, N.3
  • 9
    • 14644410489 scopus 로고    scopus 로고
    • When mind meets machine
    • V. Brower. When Mind Meets Machine. EBMO Reports, 6(2):108-110, 2005.
    • (2005) EBMO Reports , vol.6 , Issue.2 , pp. 108-110
    • Brower, V.1
  • 15
    • 1542593353 scopus 로고
    • Authentication and Authenticated Key Exchanges. Kluwer Academic Publishers
    • W. Diffie, P.C. van Oorschot, and M. Weiner. Authentication and Authenticated Key Exchanges, volume 2 of Design Codes and Cryptography, pages 107-125. Kluwer Academic Publishers, 1992.
    • (1992) Design Codes and Cryptography , vol.2 , pp. 107-125
    • Diffie, W.1    Van Oorschot, P.C.2    Weiner, M.3
  • 16
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Eurocrypt &004, pages 523-540, 2004.
    • (2004) Eurocrypt &004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 20
    • 0028824481 scopus 로고
    • Increased cortical representation of the fingers of the left hand in string players
    • T. Elbert, C. Pantev, C. Wienbruch, B. Rockstroh, and E. Taub. Increased Cortical Representation of the Fingers of the Left Hand in String Players. Science, 270:305-307, 1995.
    • (1995) Science , vol.270 , pp. 305-307
    • Elbert, T.1    Pantev, C.2    Wienbruch, C.3    Rockstroh, B.4    Taub, E.5
  • 21
    • 33745723913 scopus 로고    scopus 로고
    • site accessed Aug. 27, 2005
    • Electro-cap International, Inc. Electro-Cap Price List: Electro-Cap. http://www.electro-cap.com,site accessed Aug. 27, 2005.
    • Electro-cap Price List: Electro-cap
  • 24
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. P. Jablon. Strong Password-Only Authenticated Key Exchange. ACM SIGCOMM Computer Communication Review, 26(6):5-26, 1996.
    • (1996) ACM SIGCOMM Computer Communication Review , vol.26 , Issue.6 , pp. 5-26
    • Jablon, D.P.1
  • 29
    • 33745709845 scopus 로고    scopus 로고
    • Addressing the problem of undetected signature key compromise
    • M. Just and P.C. van Oorschot. Addressing the problem of undetected signature key compromise. In NDSS, 1999.
    • (1999) NDSS
    • Just, M.1    Van Oorschot, P.C.2
  • 31
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5-14, 1990.
    • (1990) The 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.1
  • 32
    • 0034210954 scopus 로고    scopus 로고
    • Parallel man-machine training in development of EEC-based cursor control
    • A. Kostov and M. Polak. Parallel Man-Machine Training in Development of EEC-Based Cursor Control. IEEE Transactions on Rehabilitation Engineering, 8:203-204, 2000.
    • (2000) IEEE Transactions on Rehabilitation Engineering , vol.8 , pp. 203-204
    • Kostov, A.1    Polak, M.2
  • 33
    • 84862633945 scopus 로고    scopus 로고
    • site accessed Mar. 22, 2005
    • LC Technologies Inc. Eyegaze Systems. http://www.eyegaze.com, site accessed Mar. 22, 2005.
    • Eyegaze Systems
  • 34
    • 25844443892 scopus 로고    scopus 로고
    • A comparative study on the consistency of features in on-line signature verification
    • H. Lei and V. Govindaraju. A Comparative Study on the Consistency of Features in On-Line Signature Verification. Pattern Recognition Letters, 26:2483-2489, 2005.
    • (2005) Pattern Recognition Letters , vol.26 , pp. 2483-2489
    • Lei, H.1    Govindaraju, V.2
  • 36
    • 0041739273 scopus 로고    scopus 로고
    • Adaptive brain interfaces
    • J. R. Millan. Adaptive Brain Interfaces. Communications of the ACM, 46(3):75-80, 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.3 , pp. 75-80
    • Millan, J.R.1
  • 41
    • 33745695799 scopus 로고    scopus 로고
    • site accessed Oct. 31, 2005
    • Neurosky. Neurosky Home Page. http://www.neurosky.com, site accessed Oct. 31, 2005.
    • Neurosky Home Page
  • 42
    • 0036781824 scopus 로고    scopus 로고
    • Controlling robots with the mind
    • M. A. L. Nicolelis and J. K. Chapin. Controlling Robots with the Mind. Scientific American, 289(4):46-53, 2002.
    • (2002) Scientific American , vol.289 , Issue.4 , pp. 46-53
    • Nicolelis, M.A.L.1    Chapin, J.K.2
  • 48
    • 33745709832 scopus 로고    scopus 로고
    • site accessed May 24, 2004
    • Real User Corporation. About Passfaces. http://www.realuser.com, site accessed May 24, 2004.
    • About Passfaces
  • 49
    • 0031237937 scopus 로고    scopus 로고
    • Fingerprint features statistical analysis and system performance estimates
    • A. R. Roddy and J. D. Stosz. Fingerprint Features Statistical Analysis and System Performance Estimates. Proceedings of the IEEE, 85(9):1390-1421, 1996.
    • (1996) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1390-1421
    • Roddy, A.R.1    Stosz, J.D.2
  • 50
    • 0041781819 scopus 로고    scopus 로고
    • Mind readers
    • P. Ross. Mind Readers. Scientific American, 289(3):74-77, 2003.
    • (2003) Scientific American , vol.289 , Issue.3 , pp. 74-77
    • Ross, P.1
  • 53
    • 0024681099 scopus 로고
    • Crisis and aftermath (the Internet worm)
    • E. Spafford. Crisis and Aftermath (The Internet Worm). Comm. of the ACM, 32(6):678-687, 1989.
    • (1989) Comm. of the ACM , vol.32 , Issue.6 , pp. 678-687
    • Spafford, E.1
  • 54
    • 35048814173 scopus 로고    scopus 로고
    • Addressing online dictionary attacks with login histories and humans-in-the-loop
    • Springer-Verlag LNCS 3110
    • S. Stubblebine and P.C. van Oorschot. Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. In Financial Cryptography'04 Springer-Verlag LNCS 3110, 2004.
    • (2004) Financial Cryptography'04
    • Stubblebine, S.1    Van Oorschot, P.C.2
  • 56
  • 61
    • 6344221457 scopus 로고    scopus 로고
    • From doing to being: Getting closer to the user experience
    • G. M. Wilson and M. A. Sasse. From Doing to Being: Getting Closer to the User Experience. Interacting with Computers, 16:697-705, 2004.
    • (2004) Interacting with Computers , vol.16 , pp. 697-705
    • Wilson, G.M.1    Sasse, M.A.2
  • 63
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • New Mexico, USA, site accessed Jan. 12, 2004
    • J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001. http://citeseer.nj.nec.com/yan01note.html, site accessed Jan. 12, 2004.
    • (2001) ACM New Security Paradigms Workshop
    • Yan, J.1
  • 64
    • 0008915230 scopus 로고    scopus 로고
    • The memorability and security of passwords - Some empirical results
    • Computer Laboratory, University of Cambridge, site accessed September 6, 2004
    • Jianxin Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant. The Memorability and Security of Passwords - Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000. http://www.ftp.cl.cam.ac.uk/ftp/users/rjal4/tr500.pdf, site accessed September 6, 2004.
    • (2000) Technical Report No. 500 , vol.500
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.