References
- Abo-Zahhad, M., Ahmed, S., & Abbas, S. (2015). State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. IET Biometrics, 4(3), 179–190. doi:10.1049/iet-bmt.2014.0040
- Abo-Zahhad, M., Ahmed, S. M., & Abbas, S. N. (2016). A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognition Letters, 82, 216–225. doi:10.1016/j.patrec.2015.07.034
- Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46. doi:10.1145/322796.322806
- Ali, A., Kuber, R., & Aviv, A. J. (2016). Developing and evaluating a gestural and tactile mobile interface to support user authentication. Proceedings of the iConference, 2016. doi:10.9776/16141.
- Armstrong, B. C., Ruiz-Blondet, M. V., Khalifian, N., Kurtz, K. J., Jin, Z., & Laszlo, S. (2015). Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method of ERP biometrics. Neurocomputing, 166, 59–67. doi:10.1016/j.neucom.2015.04.025
- Ashby, C., Bhatia, A., Tenore, F., & Vogelstein, J. (2011). Low-Cost Electroencephalogram (EEG) based Authentication. 2011 5th International IEEE/EMBS Conference on Neural Engineering (NER) (pp. 442–445). Cancun, Mexico: IEEE.
- Bianchi, A., Oakley, I., Kostakos, V., & Kwon, D. (2011). The Phone Lock: Audio and Haptic Shoulder-Surfing. Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction (pp. 197–200). Funchal, Portugal: ACM.
- Birbaumer, N. (2006). Breaking the silence: Brain-computer Interfaces (BCI) for communication and motor control. Psychophysiology, 43(6), 517–532. doi:10.1111/j.1469-8986.2006.00456.x
- Chuang, J., Nguyen, H., Wang, C., & Johnson, B. (2013). I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. Proceedings of the Workshop on Usable Security, USEC ’13 (pp. 1–16). Okinawa, Japan.
- De Luca, A., Hertzschuch, K., & Hussmann, H. (2010). ColorPIN: Securing PIN entry through indirect input. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1103–1106). Atlanta, GA USA: ACM.
- De Luca, A., Von Zezschwitz, E., Nguyen, N., Maurer, M. E., Rubegni, E., Scipioni, M., & Langheinrich, M. (2013). Back-of-device authentication on smartphones. The 31st Annual CHI Conference on Human Factors in Computing Systems (pp. 2389–2398). Paris, France: ACM.
- Den Hond, B. (2015). Your Brain’s unique response to words can reveal your identity. New Scientist. Retrieved from https://www.newscientist.com/article/dn27555-your-brains-unique-response-to-words-can-reveal-your-identity
- Duvinage, M., Castermans, T., Petieau, M., Hoellinger, T., Cheron, G., & Dutoit, T. (2013). Performance of the Emotiv Epoc Headset for P300-based applications. Biomedical Engineering Online, 12, 56. doi:10.1186/1475-925X-12-56
- Emotiv, Inc. (2014). Emotiv |EEG System |Electroencephalography. Retrieved from https://emotiv.com/
- Friedman, D., Leeb, R., Guger, C., Steed, A., Pfurscheller, G., & Slater, M. (2007). Navigating virtual reality by thought: What is it like? Presence, 16(1), 100–110. doi:10.1162/pres.16.1.100
- Harrison, T. (2013). The Emotiv Mind: Investigating the accuracy of the Emotiv EPOC in indentifying emotions and its use in an intelligent tutoring system. Honours Report. University of Canterbury, New Zealand, 1–59.
- Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. doi:10.1109/TCSVT.2003.818349
- Johnson, B., Maillart, T., & Chuang, J. (2014). My thoughts are not your thoughts. 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ‘14) (pp. 1329–1338). Seattle, WA USA: ACM.
- Khalifa, W., Salem, A., & Roushdy, M. (2012). A survey of EEG based user authentication schemes. The 8th International Conference on INFOrmatics and Systems (INFOS2012) (pp. BIO–55). Giza, Egypt: IEEE.
- Krishnaswamy, K., Kuber, R., & Oates, T. (2016). Developing a limb repositioning robotic interface for persons with severe physical disabilities. Universal Access in the Information Society, 15(4), 609–627. doi:10.1007/s10209-015-0439-7
- Kromholz, K., Hupperich, T., & Holz, T. (2016). Use the force: Evaluating force-sensitive authenticaion for mobile devices. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (pp. 207–219). Denver, CO USA.
- Kuber, R., & Wright, F. P. (2013). Augmenting the instant messaging experience through the use of brain computer interface and gestural technologies. International Journal of Human-Computer Interaction, 29(3), 178–191. doi:10.1080/10447318.2012.702635
- Kuber, R., & Yu, W. (2010). Feasibility study of tactile-based authentication. International Journal of Human-Computer Studies, 68, 158–181. doi:10.1016/j.ijhcs.2009.11.001
- Kumar, P., Saini, R., Roy, P., & Dogra, D. (2017). A bio-signal based framework to secure mobile devices. Journal of Network and Computer Applications, 89, 62–71. doi:10.1016/j.jnca.2017.02.011
- Li, Y., Nam, C. S., Shadden, B. B., & Johnson, S. L. (2011). A P300-based brain–computer interface: Effects of interface type and screen size. International Journal of Human-Computer Interaction, 27(1), 52–68. doi:10.1080/10447318.2011.535753
- Lopez-Gordo, M., Ron-Angevin, R., & Pelayo, F. (2015). Authentication of brain-computer interface users in network applications. International Work-Conference on Artificial Neural Networks (pp. 124–132). Springer.
- Mados, B., Adam, N., Hurtuk, J., & Copjak, M. (2013). Brain-computer interface and arduino microcontroller family software interconnection solution. 14th International Symposium on Applied Machine Intelligence and Infomatics (pp. 217–221). Herl’any Slovakia.
- Mu, Z., Hu, J., & Min, J. (2016). EEG-based person authentication using a fuzzy entropy-related approach with two electrodes. Entropy, 18(12), 432. doi:10.3390/e18120432
- Neurosky, Inc. (2017). Retrieved from https://neurosky.com/
- O’Hara, K., Sellen, A., & Harper, R. (2011). Embodiment in brain-computer interaction. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 353–362). Vancouver, BC, Canada: ACM.
- Palaniappan, R. (2008). Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems, 18(1), 59–66. doi:10.1142/S0129065708001373
- Pham, T., Ma, W., Tran, D., Nguyen, P., & Phung, D. (2014). Multi-factor EEG-based user authentication. 2014 International Joint Conference on Neural Networks (IJCNN) (pp. 4029–4034). IEEE.
- Pham, T., Ma, W., Tran, D., Tran, D., & Phung, D. (2015). A study on the stability of EEG signals for user authentication. 2015 7th International IEEE/EMBS Conference on Neural Engineering (NER) (pp. 122–125). IEEE.
- Plass-Oude Bos, D., Reuderink, B., Van De Laar, B., Hayrettin, G., Muhl, C., Poel, M., … Nijholt, A. (2010). Human-computer interaction for BCI games: Usability and user experience. 2010 International Conference on Cyberworlds (CW) (pp. 277–281). Singapore: IEEE.
- Said, K., Kuber, R., & Murphy, E. (2015). AudioAuth: Exploring the design and usability of a sound-based authentication system. International Journal of Mobile Human-Computer Interaction, 7(4), 16–34. doi:10.4018/IJMHCI
- Sourina, O., & Liu, Y. (2011). A fractal-based algorithm of emotion recognition from eeg using arousal-valence model. In Biosignals (pp. 209–214). Rome, Italy.
- Srinadhu, C., Addanki, S. K., & Acharyulu, B. R. (2011). Mirage 1.0: A key entry scheme resilient to shoulder-surfing. International Journal of Computer Applications, 29(1), 47–53. doi:10.5120/3526-4804
- Takada, T., & Koike, H. (2003). Awase-E: Image-based authentication for mobile phones using user’s favorite images. International Conference on Mobile Human-Computer Interaction (pp. 347–351). Berlin Heidelberg: Springer.
- Taylor, G. S., & Schmidt, C. (2012). Empirical evaluation of the Emotiv EPOC BCI headset for the detection of mental actions. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 56 pp. 197–197. Boston, Massachusetts USA: SAGE Publications.
- Thorpe, J., Van Oorschot, P. C., & Somayaji, A. (2005). Pass-thoughts: Authenticating with our minds. Proceedings of the 2005 Workshop on New Security Paradigms (pp. 45–56). Lake Arrowhead, CA USA: ACM.
- Wheeler, M., Wolf, F., & Kuber, R. (2013). Supporting augmented and alternative communication using a low-cost gestural device. Proceedings of the 15th International ACM Conference on Computers and Accessibility, Article No: 67.
- Wolpaw, J. R., Birbaumer, N., McFarland, D. J., Pfurtscheller, G., & Vaughan, T. M. (2002). Brain–computer Interfaces for Communication and Control. Clinical Neurophysiology, 113(6), 767–791. doi:10.1016/S1388-2457(02)00057-3
- Zhang, J., Chen, M., Zhao, S., Hu, S., Shi, Z., & Cao, Y. (2016). Relief-based EEG sensor selection methods for emotion recognition. Sensors, 16(10), 1558. doi:10.3390/s16101558
- Zhao, S., Dragicevic, P., Chignell, M., Balakrishnan, R., & Baudisch, P. (2007). earPod: eyes-free menu selection using touch input and reactive audio feedback. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1395–1404). San Jose, CA USA.