1 |
H. J. Hwang, J. H. Lim, Y. J. Jung, H. Choi, S. W. Lee, and C. H. Im, "Development of an SSVEP-based BCI spelling system adopting a QWERTY-style LED keyboard," Journal of Neuroscience Methods, vol. 208, no. 1, pp. 59-65, 2012.
DOI
|
2 |
I. Volosyak, "SSVEP-based Bremen-BCI interface--boosting information transfer rates," Journal of Neural Engineering, vol. 8, no. 3, 036020, 2011.
|
3 |
G. Blonder, "Graphical passwords," U.S. Patent 5559961, Sep 24, 1996.
|
4 |
R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, no. 1, pp. 156-163, 1967.
DOI
|
5 |
A. Paivio, T. B. Rogers, and P. C. Smythe, "Why are pictures easier to recall than words?," Psychonomic Science, vol. 11, no. 4, pp. 137-138, 1976.
DOI
|
6 |
A. E. Dirik, N. Memon, and J. C. Birget, "Modeling user choice in the PassPoints graphical password scheme," in Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, 2007, pp. 20-28.
|
7 |
D. Hong, S. Man, B. Hawes, and M. Mathews, "A graphical password scheme strongly resistant to spyware," in Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, 2004, pp. 94-100.
|
8 |
R. Dhamija and A. Perrig, "Deja vu: a user study using images for authentication," in Proceedings of the 9th USENIX Security Symposium, Denver, CO, 2000, pp. 45-58.
|
9 |
A. Perrig and D. Song, "Hash visualization: a new technique to improve real-world security," in Proceedings of International Workshop on Cryptographic Techniques and E-Commerce, Hong Kong, China, 1999, pp. 131-138.
|
10 |
S. Akula and V. Devisetty, "Image based registration and authentication system," in Proceedings of Midwest Instruction and Computing Symposium, Morris, MN, 2004.
|
11 |
D. Weinshall and S. Kirkpatrick, "Passwords you'll never forget, but can't recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI), Vienna, Austria, 2004, pp. 1399-1402.
|
12 |
W. Jansen, "Authenticating mobile device users through image selection," in The Internet Society: Advances in Learning, Commerce and Security. Southampton, UK: WIT Press, 2004, pp. 184-192
|
13 |
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," in Proceedings of the 8th USENIX Security Symposium, Washington, DC, 1999.
|
14 |
A. F. Syukri, E. Okamoto, and M. Mambo, "A user identification system using signature written with mouse," in Information Security and Privacy. Berlin: Springer, 1998, pp. 403-414.
|
15 |
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, vol. 63, no. 1-2, pp. 102-127, 2005.
DOI
|
16 |
B. Rockstroh, T. Elbert, A. Canavan, W. Lutzenberger, and N. Birbaumer, Slow Cortical Potentials and Behavior, 2nd ed. Baltimore, MD: Urban & Schwarzenberg, 1989.
|
17 |
Wikipedia, "Authentication," [Online]. Available: https://en.wikipedia.org/wiki/Authentication.
|
18 |
H. Berger, "Uber das electrenkephalogramm des menschen," Archiv fur Psychiatrie und Nervenkrankheiten, vol. 87, no. 1, pp. 527-570, 1929.
DOI
|
19 |
T. A. Travis, C. Y. Kondo, and J. R. Knott, "Alpha enhancement research: a review," Biological Psychiatry, vol. 10, no. 1, pp. 69-89, 1975.
|
20 |
M. B. Sterman, "Basic concepts and clinical findings in the treatment of seizure disorders with EEG operant conditioning," Clinical Electroencephalography, vol. 31, no. 1, pp. 45-55, 2000.
DOI
|
21 |
H. J. Hwang, S. Kim, S. Choi, and C. H. Im, EEG-based brain-computer interfaces: a thorough literature survey, International Journal of Human-Computer Interaction, vol. 29, no. 12, pp. 814-826, 2013.
DOI
|
22 |
S. Brostoff and M. A. Sasse, "Are passfaces more usable than passwords? A field trial investigation," in People and Computers XIV - Usability or Else. London, UK: Springer, 2000, pp. 405-424.
|
23 |
M. Boroditsky, "Passlogix password schemes," 2002 [Online]. Available: http://www.passlogix.com.
|
24 |
G. C. Yang, "T-TIME: a password scheme based on touch signal generation time difference," Journal of Advanced Information Technology and Convergence, vol. 8, no. 2, pp.41-46, 2018.
DOI
|
25 |
G. C. Yang, "PassPositions: a secure and user-friendly graphical password scheme," in Proceedings of 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-5.
|
26 |
G. C. Yang and H. Oh, "Implementation of a graphical password authentication system 'PassPositions'," Journal of Image and Graphics, vol. 6, no. 2. pp. 117-121, 2018.
DOI
|
27 |
G. C. Yang, "A new graphical password system using intersecting points in a signature," International Journal of Engineering & Technology, vol. 7, no. 4.39, pp. 61-64, 2018.
|
28 |
G. C. Yang, "A multimodal password system based on graphics and text," Engineering Letters, vol. 28, no. 2, pp. 300-305, 2020.
|
29 |
R. Biddle, S. Chiasson, and P. C. Van Oorschot, "Graphical passwords: learning from the first twelve years," ACM Computing Surveys (CSSUR), vol. 44, no. 4, article no. 19, 2012.
|
30 |
G. C. Yang, "Development status and prospects of graphical password authentication system in Korea," KSII Transactions on Internet and Information Systems, vol. 13, no. 11, pp. 5755-5772, 2019.
DOI
|
31 |
T. M. Li, H. C. Chao, and J. Zhang, "Emotion classification based on brain wave: a survey," Human-centric Computing and Information Sciences, vol. 9, Article no. 42, 2019.
|
32 |
D. Nield, "Scientists have connected the brains of 3 people, enabling them to share thoughts," 2018 [Online]. Available: https://www.sciencealert.com/brain-to-brain-mind-connection-lets-three-people-share-thoughts.
|
33 |
N. H. Keum, T. Lee, J. B. Lee, and H. P. "Measuring the degree of content immersion in a non-experimental environment using a portable EEG device," Journal of Information Processing Systems, vol. 14, no. 4, pp. 1049-1061, 2018.
DOI
|
34 |
T. Pedersen, C. Johansen, and A. Josang, "Behavioural computer science: an agenda for combining modelling of human and system behaviours," Human-centric Computing and Information Sciences, vol. 8, article no. 7, 2018.
|
35 |
V. Suryani, S. Sulistyo, and W. Widyawan, "Two-phase security protection for the internet of things object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431-1437, 2018.
DOI
|
36 |
A. J. Casson, D. C. Yates, S. J. M. Smith, J. S. Duncan, and E. Rodriguez-Villegas, "Wearable electroencephalography," IEEE Engineering in Medicine and Biology Magazine, vol. 29, no. 3, pp. 44-56, 2010.
DOI
|
37 |
F. Wang, G. Li, J. Chen, Y. Duan, and D. Zhang, "Novel semi-dry electrodes for brain-computer interface applications," Journal of Neural Engineering, vol. 13, no. 4, article no. 046021, 2016.
|