Communications of the ACM
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Statistical Pattern Recognition: A Review
IEEE Transactions on Pattern Analysis and Machine Intelligence
On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey
IEEE Transactions on Pattern Analysis and Machine Intelligence
A note on proactive password checking
Proceedings of the 2001 workshop on New security paradigms
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
The Handbook of Brain Theory and Neural Networks
The Handbook of Brain Theory and Neural Networks
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Communications of the ACM
Authentication and Delegation with Smart-cards
TACS '91 Proceedings of the International Conference on Theoretical Aspects of Computer Software
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A PIN-entry method resilient against shoulder surfing
Proceedings of the 11th ACM conference on Computer and communications security
Towards Secure Design Choices for Implementing Graphical Passwords
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Fast dictionary attacks on passwords using time-space tradeoff
Proceedings of the 12th ACM conference on Computer and communications security
Keyboard acoustic emanations revisited
Proceedings of the 12th ACM conference on Computer and communications security
A comparative study on the consistency of features in on-line signature verification
Pattern Recognition Letters
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Graphical dictionaries and the memorable space of graphical passwords
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
IEEE Transactions on Circuits and Systems for Video Technology
A local neural classifier for the recognition of EEG patterns associated to mental tasks
IEEE Transactions on Neural Networks
Reducing shoulder-surfing by using gaze-based password entry
Proceedings of the 3rd symposium on Usable privacy and security
Passwords for everyone: secure mnemonic-based accessible authentication
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
The Use of Photo Retrieval for EEG-Based Personal Identification
APCHI '08 Proceedings of the 8th Asia-Pacific conference on Computer-Human Interaction
Action-based user authentication
International Journal of Electronic Security and Digital Forensics
Simulation and experimental studies on fuzzy vault fingerprint cryptography
International Journal of Knowledge-based and Intelligent Engineering Systems
Look into my eyes!: can you guess my password?
Proceedings of the 5th Symposium on Usable Privacy and Security
Implicit emotional tagging of multimedia using EEG signals and brain computer interface
WSM '09 Proceedings of the first SIGMM workshop on Social media
Proceedings of the 2010 workshop on New security paradigms
Security and privacy considerations in digital death
Proceedings of the 2011 workshop on New security paradigms workshop
On the feasibility of side-channel attacks with brain-computer interfaces
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Motor imagery EEG-based person verification
IWANN'13 Proceedings of the 12th international conference on Artificial Neural Networks: advences in computational intelligence - Volume Part II
Hi-index | 0.00 |
We present a novel idea for user authentication that we call pass-thoughts. Recent advances in Brain-Computer Interface (BCI) technology indicate that there is potential for a new type of human-computer interaction: a user transmitting thoughts directly to a computer. The goal of a pass-thought system would be to extract as much entropy as possible from a user's brain signals upon "transmitting" a thought. Provided that these brain signals can be recorded and processed in an accurate and repeatable way, a pass-thought system might provide a quasi two-factor, changeable, authentication method resistant to shoulder-surfing. The potential size of the space of a pass-thought system would seem to be unbounded in theory, although in practice it will be finite due to system constraints. In this paper, we discuss the motivation and potential of pass-thought authentication, the status quo of BCI technology, and outline the design of what we believe to be a currently feasible pass-thought system. We also briefly mention the need for general exploration and open debate regarding ethical considerations for such technologies.