-
1
-
-
84901211696
-
Authentication and delegation with smart-cards
-
Martin Abadi, Michael Burrows, C. Kaufman, and Butler W. Lampson. Authentication and Delegation with Smart-cards. In Theoretical Aspects of Computer Software, pages 326-345, 1991.
-
(1991)
Theoretical Aspects of Computer Software
, pp. 326-345
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.W.4
-
2
-
-
33745695820
-
-
M. A. Arbib, editor. The MIT Press, second edition
-
M. A. Arbib, editor. The Handbook of Brain Theory and Neural Networks, pages 178-181. The MIT Press, second edition, 2003.
-
(2003)
The Handbook of Brain Theory and Neural Networks
, pp. 178-181
-
-
-
4
-
-
0032640422
-
A spelling device for the paralyzed
-
N. Bierbaumer, N. Ghanayim, T. Hinterberger, I. Iversen, B. Kotchoubey, A. Kubler, J. Perelmouter, E. Taub, and H. Flor. A Spelling Device for the Paralyzed. Nature, 398:297-298, 1999.
-
(1999)
Nature
, vol.398
, pp. 297-298
-
-
Bierbaumer, N.1
Ghanayim, N.2
Hinterberger, T.3
Iversen, I.4
Kotchoubey, B.5
Kubler, A.6
Perelmouter, J.7
Taub, E.8
Flor, H.9
-
5
-
-
33745681527
-
-
N. Birbaumer, A. Kubler, N. Ghanayim, T. Hinterberger, J. Perelmouter, J. Kaiser, I. Iversen, and B. Kotchoubey. The Thought Translation Device (TTD) for Completely Paralyzed Patients, 2000.
-
(2000)
The Thought Translation Device (TTD) for Completely Paralyzed Patients
-
-
Birbaumer, N.1
Kubler, A.2
Ghanayim, N.3
Hinterberger, T.4
Perelmouter, J.5
Kaiser, J.6
Iversen, I.7
Kotchoubey, B.8
-
6
-
-
7544230652
-
Robust discretization, with an application to graphical passwords
-
site accessed Jan. 12, 2004
-
J.-C. Birget, D. Hong, and N. Memon. Robust Discretization, With an Application to Graphical Passwords. Cryptology ePrint Archive, Report 2003/168, 2003. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
-
(2003)
Cryptology EPrint Archive, Report
, vol.2003
, Issue.168
-
-
Birget, J.-C.1
Hong, D.2
Memon, N.3
-
9
-
-
14644410489
-
When mind meets machine
-
V. Brower. When Mind Meets Machine. EBMO Reports, 6(2):108-110, 2005.
-
(2005)
EBMO Reports
, vol.6
, Issue.2
, pp. 108-110
-
-
Brower, V.1
-
15
-
-
1542593353
-
-
Authentication and Authenticated Key Exchanges. Kluwer Academic Publishers
-
W. Diffie, P.C. van Oorschot, and M. Weiner. Authentication and Authenticated Key Exchanges, volume 2 of Design Codes and Cryptography, pages 107-125. Kluwer Academic Publishers, 1992.
-
(1992)
Design Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Weiner, M.3
-
16
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Eurocrypt &004, pages 523-540, 2004.
-
(2004)
Eurocrypt &004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
20
-
-
0028824481
-
Increased cortical representation of the fingers of the left hand in string players
-
T. Elbert, C. Pantev, C. Wienbruch, B. Rockstroh, and E. Taub. Increased Cortical Representation of the Fingers of the Left Hand in String Players. Science, 270:305-307, 1995.
-
(1995)
Science
, vol.270
, pp. 305-307
-
-
Elbert, T.1
Pantev, C.2
Wienbruch, C.3
Rockstroh, B.4
Taub, E.5
-
21
-
-
33745723913
-
-
site accessed Aug. 27, 2005
-
Electro-cap International, Inc. Electro-Cap Price List: Electro-Cap. http://www.electro-cap.com,site accessed Aug. 27, 2005.
-
Electro-cap Price List: Electro-cap
-
-
-
24
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon. Strong Password-Only Authenticated Key Exchange. ACM SIGCOMM Computer Communication Review, 26(6):5-26, 1996.
-
(1996)
ACM SIGCOMM Computer Communication Review
, vol.26
, Issue.6
, pp. 5-26
-
-
Jablon, D.P.1
-
26
-
-
19944377914
-
Picture password: A visual login technique for mobile devices
-
site accessed Mar. 22, 2004
-
Wayne Jansen, Serban Gavrila, Vlad Korolev, Rick Ayers, and Ryan Swanstrom. Picture Password: A Visual Login Technique for Mobile Devices. National Institute of Standards and Technology Interagency Report (NISTIR) 7030, 2003. http://csrc.nist.gov/publications/nistir/nistir-7030.pdf, site accessed Mar. 22, 2004.
-
(2003)
National Institute of Standards and Technology Interagency Report (NISTIR)
, vol.7030
-
-
Jansen, W.1
Gavrila, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
27
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. 8th USENIX Security Symposium, 1999.
-
(1999)
8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
29
-
-
33745709845
-
Addressing the problem of undetected signature key compromise
-
M. Just and P.C. van Oorschot. Addressing the problem of undetected signature key compromise. In NDSS, 1999.
-
(1999)
NDSS
-
-
Just, M.1
Van Oorschot, P.C.2
-
31
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5-14, 1990.
-
(1990)
The 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.1
-
32
-
-
0034210954
-
Parallel man-machine training in development of EEC-based cursor control
-
A. Kostov and M. Polak. Parallel Man-Machine Training in Development of EEC-Based Cursor Control. IEEE Transactions on Rehabilitation Engineering, 8:203-204, 2000.
-
(2000)
IEEE Transactions on Rehabilitation Engineering
, vol.8
, pp. 203-204
-
-
Kostov, A.1
Polak, M.2
-
33
-
-
84862633945
-
-
site accessed Mar. 22, 2005
-
LC Technologies Inc. Eyegaze Systems. http://www.eyegaze.com, site accessed Mar. 22, 2005.
-
Eyegaze Systems
-
-
-
34
-
-
25844443892
-
A comparative study on the consistency of features in on-line signature verification
-
H. Lei and V. Govindaraju. A Comparative Study on the Consistency of Features in On-Line Signature Verification. Pattern Recognition Letters, 26:2483-2489, 2005.
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 2483-2489
-
-
Lei, H.1
Govindaraju, V.2
-
35
-
-
0036030112
-
Impact of artificial "gummy" fingers on fingerprint systems
-
Rudolf L. van Renesse, editor, April
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of Artificial "Gummy" Fingers on Fingerprint Systems. In Rudolf L. van Renesse, editor, SPIE Optical Security and Counterfeit Deterrence. Techniques IV, volume 4677, pages 275-289, April 2002.
-
(2002)
SPIE Optical Security and Counterfeit Deterrence. Techniques IV
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
36
-
-
0041739273
-
Adaptive brain interfaces
-
J. R. Millan. Adaptive Brain Interfaces. Communications of the ACM, 46(3):75-80, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.3
, pp. 75-80
-
-
Millan, J.R.1
-
37
-
-
0036565003
-
A local neural classifier for the recognition of EEC patterns associated to mental tasks
-
J. R. Millan, J. Mourino, M. Franze, F. Cincotti, M. Varsta, J. Heikkonen, and F. Babiloni. A Local Neural Classifier for the Recognition of EEC Patterns Associated to Mental Tasks. IEEE Transactions on Neural Networks, 13(3):678-686, 2002.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.3
, pp. 678-686
-
-
Millan, J.R.1
Mourino, J.2
Franze, M.3
Cincotti, F.4
Varsta, M.5
Heikkonen, J.6
Babiloni, F.7
-
39
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel. Password Hardening based on Keystroke Dynamics. International Journal of Information Security, 1(1):69-83, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
41
-
-
33745695799
-
-
site accessed Oct. 31, 2005
-
Neurosky. Neurosky Home Page. http://www.neurosky.com, site accessed Oct. 31, 2005.
-
Neurosky Home Page
-
-
-
44
-
-
0034838721
-
The electroencephalogram as a biometric
-
R.B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles. The Electroencephalogram as a Biometric. In The Canadian Conference on Electrical and Computer Engineering, pages 1363-1366, 2001.
-
(2001)
The Canadian Conference on Electrical and Computer Engineering
, pp. 1363-1366
-
-
Paranjape, R.B.1
Mahovsky, J.2
Benedicenti, L.3
Koles, Z.4
-
48
-
-
33745709832
-
-
site accessed May 24, 2004
-
Real User Corporation. About Passfaces. http://www.realuser.com, site accessed May 24, 2004.
-
About Passfaces
-
-
-
49
-
-
0031237937
-
Fingerprint features statistical analysis and system performance estimates
-
A. R. Roddy and J. D. Stosz. Fingerprint Features Statistical Analysis and System Performance Estimates. Proceedings of the IEEE, 85(9):1390-1421, 1996.
-
(1996)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1390-1421
-
-
Roddy, A.R.1
Stosz, J.D.2
-
50
-
-
0041781819
-
Mind readers
-
P. Ross. Mind Readers. Scientific American, 289(3):74-77, 2003.
-
(2003)
Scientific American
, vol.289
, Issue.3
, pp. 74-77
-
-
Ross, P.1
-
53
-
-
0024681099
-
Crisis and aftermath (the Internet worm)
-
E. Spafford. Crisis and Aftermath (The Internet Worm). Comm. of the ACM, 32(6):678-687, 1989.
-
(1989)
Comm. of the ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.1
-
54
-
-
35048814173
-
Addressing online dictionary attacks with login histories and humans-in-the-loop
-
Springer-Verlag LNCS 3110
-
S. Stubblebine and P.C. van Oorschot. Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. In Financial Cryptography'04 Springer-Verlag LNCS 3110, 2004.
-
(2004)
Financial Cryptography'04
-
-
Stubblebine, S.1
Van Oorschot, P.C.2
-
55
-
-
33745475367
-
-
March, site accessed Mar. 22, 2005
-
G. Tally, R. Thomas, and T. Van Vleck. Anti-Phishing: Best Practices for Institutions and Consumers, March 2004. http://www.networkassociates.com/us/_tier2/products/_media/mcafee/wp\_a%ntiphishing. pdf, site accessed Mar. 22, 2005.
-
(2004)
Anti-phishing: Best Practices for Institutions and Consumers
-
-
Tally, G.1
Thomas, R.2
Van Vleck, T.3
-
58
-
-
33745709797
-
-
T. M. Vaughan, W. J. Heetderks, L.J. Trejo, W. Z. Rymer, M. Weinrich, M. M. Moore, A. Kubler, B. H. Dobkin, N. Birbaumer, E. Donchin, E. W. Wolpaw, and J. R. Wolpaw. Brain-computer interface technology: A review of the Second International Meeting, 2003.
-
(2003)
Brain-computer Interface Technology: A Review of the Second International Meeting
-
-
Vaughan, T.M.1
Heetderks, W.J.2
Trejo, L.J.3
Rymer, W.Z.4
Weinrich, M.5
Moore, M.M.6
Kubler, A.7
Dobkin, B.H.8
Birbaumer, N.9
Donchin, E.10
Wolpaw, E.W.11
Wolpaw, J.R.12
-
59
-
-
3142521804
-
Thought communication and control: A first step using radiotelegraphy
-
K. Warwick, M. Gasson, B. Hutt, I. Goodhew, P. Kyberd, H. Schulzrinne, and X. Wu. Thought Communication and Control: a First Step Using Radiotelegraphy. IEEE Proc. Commun., 151(3):185-189, 2004.
-
(2004)
IEEE Proc. Commun.
, vol.151
, Issue.3
, pp. 185-189
-
-
Warwick, K.1
Gasson, M.2
Hutt, B.3
Goodhew, I.4
Kyberd, P.5
Schulzrinne, H.6
Wu, X.7
-
60
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63:102-127, 2005.
-
(2005)
International J. of Human-computer Studies (Special Issue on HCI Research in Privacy and Security)
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
61
-
-
6344221457
-
From doing to being: Getting closer to the user experience
-
G. M. Wilson and M. A. Sasse. From Doing to Being: Getting Closer to the User Experience. Interacting with Computers, 16:697-705, 2004.
-
(2004)
Interacting with Computers
, vol.16
, pp. 697-705
-
-
Wilson, G.M.1
Sasse, M.A.2
-
62
-
-
0036271135
-
Brain-computer interfaces for communication and control
-
J. R. Wolpaw, N. Birbaumer, D. J. McFarland, G. Pfurtscheller, and T. M. Vaughan. Brain-Computer Interfaces For Communication and Control. Clinical Neurophysiology, 113:767-791, 2002.
-
(2002)
Clinical Neurophysiology
, vol.113
, pp. 767-791
-
-
Wolpaw, J.R.1
Birbaumer, N.2
McFarland, D.J.3
Pfurtscheller, G.4
Vaughan, T.M.5
-
63
-
-
0242708748
-
A note on proactive password checking
-
New Mexico, USA, site accessed Jan. 12, 2004
-
J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001. http://citeseer.nj.nec.com/yan01note.html, site accessed Jan. 12, 2004.
-
(2001)
ACM New Security Paradigms Workshop
-
-
Yan, J.1
-
64
-
-
0008915230
-
The memorability and security of passwords - Some empirical results
-
Computer Laboratory, University of Cambridge, site accessed September 6, 2004
-
Jianxin Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant. The Memorability and Security of Passwords - Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000. http://www.ftp.cl.cam.ac.uk/ftp/users/rjal4/tr500.pdf, site accessed September 6, 2004.
-
(2000)
Technical Report No. 500
, vol.500
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|