{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T04:10:30Z","timestamp":1728792630338},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Helmholtz Association (HGF) within topic \u201c46.23 Engineering Secure Systems\u201d (KASTEL Security Research Labs) and Germany\u2019s Excellence Strategy","award":["EXC 2050\/1 \u2018CeTI\u2019; ID 390696704"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2023,8,30]]},"abstract":"Brainwaves have demonstrated to be unique enough across individuals to be useful as biometrics. They also provide promising advantages over traditional means of authentication, such as resistance to external observability, revocability, and intrinsic liveness detection. However, most of the research so far has been conducted with expensive, bulky, medical-grade helmets, which offer limited applicability for everyday usage. With the aim to bring brainwave authentication and its benefits closer to real world deployment, we investigate brain biometrics with consumer devices. We conduct a comprehensive measurement experiment and user study that compare five authentication tasks on a user sample up to 10 times larger than those from previous studies, introducing three novel techniques based on cognitive semantic processing. Furthermore, we apply our analysis on high-quality open brainwave data obtained with a medical-grade headset, to assess the differences. We investigate both the performance, security, and usability of the different options and use this evidence to elicit design and research recommendations. Our results show that it is possible to achieve Equal Error Rates as low as 7.2% (a reduction between 68\u201372% with respect to existing approaches) based on brain responses to images with current inexpensive technology. We show that the common practice of testing authentication systems only with known attacker data is unrealistic and may lead to overly optimistic evaluations. With regard to adoption, users call for simpler devices, faster authentication, and better privacy.<\/jats:p>","DOI":"10.1145\/3579356","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T11:30:04Z","timestamp":1674041404000},"page":"1-36","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices"],"prefix":"10.1145","volume":"26","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7401-6185","authenticated-orcid":false,"given":"Patricia","family":"Arias-Cabarcos","sequence":"first","affiliation":[{"name":"Paderborn University, Paderborn, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4315-9129","authenticated-orcid":false,"given":"Matin","family":"Fallahi","sequence":"additional","affiliation":[{"name":"KASTEL\/KIT, Karlsruhe, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6279-1555","authenticated-orcid":false,"given":"Thilo","family":"Habrich","sequence":"additional","affiliation":[{"name":"Universit\u00e1t Mannheim, Mannheim, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2624-9117","authenticated-orcid":false,"given":"Karen","family":"Schulze","sequence":"additional","affiliation":[{"name":"Universit\u00e1t Mannheim, Mannheim, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9036-1410","authenticated-orcid":false,"given":"Christian","family":"Becker","sequence":"additional","affiliation":[{"name":"Universit\u00e1t Stuttgart, Stuttgart, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8723-9692","authenticated-orcid":false,"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[{"name":"KASTEL\/KIT, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,3,13]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0040"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.07.034"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1974.1100705"},{"key":"e_1_3_3_5_2","unstructured":"Patricia Arias-Cabarcos Thilo Habrich Karen Becker Christian Becker and Thorsten Strufe. 2021. Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance."},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.025"},{"key":"e_1_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Corey Ashby Amit Bhatia Francesco Tenore and Jacob Vogelstein. 2011. Low-cost electroencephalogram (EEG) based authentication. 442\u2013445.","DOI":"10.1109\/NER.2011.5910581"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1111\/psyp.12888"},{"key":"e_1_3_3_9_2","doi-asserted-by":"crossref","unstructured":"Md. Khayrul Bashar Ishio Chiaki and Hiroaki Yoshida. 2016. Human identification from brain EEG signals using advanced machine learning method EEG-based biometrics. 475\u2013479.","DOI":"10.1109\/IECBES.2016.7843496"},{"key":"e_1_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Karen Becker Patricia Arias-Cabarcos Thilo Habrich and Christian Becker. 2019. Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems. 2577\u20132579.","DOI":"10.1145\/3319535.3363260"},{"key":"e_1_3_3_11_2","article-title":"Cybersecurity in brain-computer interfaces: State-of-the-art, opportunities, and future challenges","author":"Bernal Sergio L\u00f3pez","year":"2019","unstructured":"Sergio L\u00f3pez Bernal, Alberto Huertas Celdr\u00e1n, Gregorio Mart\u00ednez P\u00e9rez, Michael Taynnan Barros, and Sasitharan Balasubramaniam. 2019. Cybersecurity in brain-computer interfaces: State-of-the-art, opportunities, and future challenges. arXiv:1908.03536 (2019).","journal-title":"arXiv:1908.03536"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1113\/jphysiol.2006.125633"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1192\/S0007125000291897"},{"key":"e_1_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Maria V. Ruiz Blondet Sarah Laszlo and Zhanpeng Jin. 2015. Assessment of permanence of non-volitional EEG brainwaves as a biometric. 6 pages.","DOI":"10.1109\/ISBA.2015.7126359"},{"key":"e_1_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Tamara Bonaci Ryan Calo and Howard Jay Chizeck. 2014. App stores for the brain: Privacy & security in Brain-Computer Interfaces. 7 pages.","DOI":"10.1109\/ETHICS.2014.6893415"},{"key":"e_1_3_3_16_2","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau Cormac Herley Paul C. Van Oorschot and Frank Stajano. 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. 553\u2013567 pages.","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_3_17_2","doi-asserted-by":"crossref","unstructured":"Katharine Brigham and B. V. K. Vijaya Kumar. 2010. Subject identification from electroencephalogram (EEG) signals during imagined speech. 8 pages.","DOI":"10.1109\/BTAS.2010.5634515"},{"issue":"194","key":"e_1_3_3_18_2","first-page":"4","article-title":"SUS-A quick and dirty usability scale","volume":"189","author":"Brooke John","year":"1996","unstructured":"John Brooke, P. W. Jordan, B. Thomas, B. A. Weerdmeester, and I. L McClelland. 1996. SUS-A quick and dirty usability scale. Usability Evaluation in Industry 189, 194 (1996), 4\u20137.","journal-title":"Usability Evaluation in Industry"},{"key":"e_1_3_3_19_2","doi-asserted-by":"crossref","unstructured":"Daniel Buschek Alexander De Luca and Florian Alt. 2015. Improving accuracy applicability and usability of keystroke biometrics on mobile touchscreen devices. 1393\u20131402.","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(07)70084-X"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.3389\/fninf.2018.00066"},{"key":"e_1_3_3_22_2","unstructured":"Gabriel Chuang and John Chuang. 2016. Passthoughts on the Go : Effect of Exercise on EEG Authentication. (2016). unpublished."},{"key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-41320-9_1","article-title":"I think, therefore I am: Usability and security of authentication using brainwaves","volume":"7862","author":"Chuang John","year":"2013","unstructured":"John Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson. 2013. I think, therefore I am: Usability and security of authentication using brainwaves. Lecture Notes in Computer Science 7862 LNCS (2013), 1\u201316.","journal-title":"Lecture Notes in Computer Science"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Hieu Dao Dinh-Huan Nguyen and Minh-Triet Tran. 2021. Face Recognition in the Wild for Secure Authentication with Open Set Approach. 338\u2013355.","DOI":"10.1007\/978-3-030-91387-8_22"},{"key":"e_1_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Alexander De Luca Marian Harbach Emanuel von Zezschwitz Max-Emanuel Maurer Bernhard Ewald Slawik Heinrich Hussmann and Matthew Smith. 2014. Now you see me now you don\u2019t: Protecting smartphone authentication from shoulder surfers. 2937\u20132946.","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/0926-6410(96)00032-8"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1186\/1475-925X-12-56"},{"key":"e_1_3_3_29_2","unstructured":"Emotiv Systems. Accessed: 31.07.2019. Emotiv EEG Headset Comparison Page https:\/\/www.emotiv.com\/comparison\/."},{"key":"e_1_3_3_30_2","unstructured":"EU. Accessed: 30.04.2019. General Data Protection Regulation https:\/\/gdpr-info.eu\/."},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2697065"},{"key":"e_1_3_3_32_2","first-page":"1","article-title":"Subliminal probing for private information via EEG-based BCI devices","volume":"1312","author":"Frank Mario","year":"2013","unstructured":"Mario Frank, Tiffany Hwu, Sakshi Jain, Robert Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, and Dawn Song. 2013. Subliminal probing for private information via EEG-based BCI devices. CoRR abs\/1312.6052 (December2013), 1\u201312.","journal-title":"CoRR"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230632"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1136\/jnnp.74.1.9"},{"key":"e_1_3_3_35_2","unstructured":"InteraXon Inc. [n. d.]. https:\/\/choosemuse.com\/. Accessed: 05.02.2020."},{"key":"e_1_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Isuru Jayarathne Michael Cohen and Senaka Amarakeerthi. 2017. Survey of EEG-based biometric authentication. 324\u2013329.","DOI":"10.1109\/ICAwST.2017.8256471"},{"key":"e_1_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Benjamin Johnson Thomas Maillart and John Chuang. 2014. My thoughts are not your thoughts. 1329\u20131338.","DOI":"10.1145\/2638728.2641710"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2020.117465"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2012.2234056"},{"key":"e_1_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Belal Korany Chitra R. Karanam Hong Cai and Yasamin Mostofi. 2019. XModal-ID: Using WiFi for Through-Wall Person Identification from Candidate Video Footage. 15 pages.","DOI":"10.1145\/3300061.3345437"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.093008.131123"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.7350657"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1038\/307161a0"},{"volume-title":"Research Methods in Human-Computer Interaction","year":"2017","author":"Lazar Jonathan","key":"e_1_3_3_44_2","unstructured":"Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2017. Research Methods in Human-Computer Interaction. Morgan Kaufmann."},{"key":"e_1_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Feng Lin Kun Woo Cho Chen Song Wenyao Xu and Zhanpeng Jin. 2018. Brain password: A secure and truly cancelable brain biometrics for smart headwear. 296\u2013309.","DOI":"10.1145\/3210240.3210344"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/aab2f2"},{"key":"e_1_3_3_47_2","unstructured":"Myndplay Ltd. [n. d.]. www.myndplay.com\/. Accessed: 05.02.2020."},{"key":"e_1_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Yao Ma and Jinjuan Feng. 2011. Evaluating usability of three authentication methods in web-based application. 81\u201388.","DOI":"10.1109\/SERA.2011.18"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2481870"},{"key":"e_1_3_3_50_2","unstructured":"Anthony J. Mansfield and James L. Wayman. 2002. Best practices in testing and reporting performance of biometric devices. (2002)."},{"key":"e_1_3_3_51_2","first-page":"189","volume-title":"Twelfth Symposium on usable Privacy and Security (SOUPS 2016)","author":"Mare Shrirang","year":"2016","unstructured":"Shrirang Mare, Mary Baker, and Jeremy Gummeson. 2016. A study of authentication in daily life. In Twelfth Symposium on usable Privacy and Security (SOUPS 2016). 189\u2013206."},{"key":"e_1_3_3_52_2","unstructured":"Ivan Martinovic Doug Davies Mario Frank Daniele Perito Tomas Ros and Dawn Song. 2012. On the feasibility of side-channel attacks with brain-computer interfaces. 34\u201343."},{"key":"e_1_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Takehiro Maruoka Kenta Kambe Hideki Harada and Isao Nakanishi. 2017. A study on evoked potential by inaudible auditory stimulation toward continuous biometric authentication. 1171\u20131174.","DOI":"10.1109\/TENCON.2017.8228034"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171537"},{"volume-title":"Qualitative Data Analysis: An Expanded Sourcebook","year":"1994","author":"Miles Matthew B.","key":"e_1_3_3_55_2","unstructured":"Matthew B. Miles and A. Michael Huberman. 1994. Qualitative Data Analysis: An Expanded Sourcebook. Sage."},{"key":"e_1_3_3_56_2","doi-asserted-by":"crossref","unstructured":"Chisei Miyamoto Sadanao Baba and Isao Nakanishi. 2009. Biometric person authentication using new spectral features of electroencephalogram (EEG). 4 pages.","DOI":"10.1109\/ISPACS.2009.4806762"},{"issue":"1","key":"e_1_3_3_57_2","first-page":"49","article-title":"Using brain waves as new biometric feature for authenticating a computer user in real-time","volume":"7","author":"Mohanchandra Kusuma","year":"2013","unstructured":"Kusuma Mohanchandra. 2013. Using brain waves as new biometric feature for authenticating a computer user in real-time. International Journal of Biometric and Bioinformatics 7, 1 (2013), 49\u201357.","journal-title":"International Journal of Biometric and Bioinformatics"},{"key":"e_1_3_3_58_2","doi-asserted-by":"crossref","unstructured":"Isao Nakanishi Sadanao Baba and Shigang Li. 2011. Evaluation of Brain Waves as Biometrics for Driver Authentication Using Simplified Driving Simulator. 71\u201376.","DOI":"10.1109\/ICBAKE.2011.27"},{"key":"e_1_3_3_59_2","doi-asserted-by":"crossref","unstructured":"Isao Nakanishi and Masashi Hattori. 2017. Biometric potential of brain waves evoked by invisible visual stimulation. 94\u201399.","DOI":"10.1109\/ICBAKE.2017.8090644"},{"key":"e_1_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Isao Nakanishi and Takehiro Maruoka. 2019. Biometric authentication using evoked potentials stimulated by personal ultrasound. 365\u2013368.","DOI":"10.1109\/TSP.2019.8769090"},{"key":"e_1_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Isao Nakanishi and Takuya Yoshikawa. 2015. Brain waves as unconscious biometrics towards continuous authentication - the effects of introducing PCA into feature extraction. 422\u2013425.","DOI":"10.1109\/ISPACS.2015.7432808"},{"key":"e_1_3_3_62_2","unstructured":"NeuroSky. Accessed: 30.04.2019. NeuroSky MindWave Family Description Page http:\/\/neurosky.com\/about-neurosky\/."},{"issue":"4","key":"e_1_3_3_63_2","first-page":"222","article-title":"Multiple mental thought parametric classification: A new approach for individual identification","volume":"2","author":"Palaniappan Ramaswamy","year":"2005","unstructured":"Ramaswamy Palaniappan. 2005. Multiple mental thought parametric classification: A new approach for individual identification. International Journal of Signal Processing 2, 4 (2005), 222\u2013226.","journal-title":"International Journal of Signal Processing"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065708001373"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1013"},{"key":"e_1_3_3_66_2","article-title":"Responsibility and tangible security: Towards a theory of user acceptance of security tokens","author":"Payne Jeunese","year":"2016","unstructured":"Jeunese Payne, Graeme Jenkinson, Frank Stajano, M. Angela Sasse, and Max Spencer. 2016. Responsibility and tangible security: Towards a theory of user acceptance of security tokens. arXiv preprint arXiv:1605.03478 (2016).","journal-title":"arXiv preprint arXiv:1605.03478"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-018-01193-y"},{"key":"e_1_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Tanya Piplani Nick Merill and John Chuang. 2018. Faking it Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks. 7 pages.","DOI":"10.1109\/BTAS.2018.8698606"},{"key":"e_1_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Marios Poulos Maria Rangoussi and Nikolaos Alexandris. 1999. Neural network based person identification using EEG features. 1117\u20131120.","DOI":"10.1109\/ICASSP.1999.759940"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Scott Ruoti Brent Roberts and Kent Seamons. 2015. Authentication melee: A usability analysis of seven web authentication systems. 916\u2013926.","DOI":"10.1145\/2736277.2741683"},{"key":"e_1_3_3_72_2","article-title":"Consumer grade EEG measuring sensors as research tools: A review","author":"Sawangjai Phattarapong","year":"2019","unstructured":"Phattarapong Sawangjai, Supanida Hompoonsup, Pitshaporn Leelaarporn, Supavit Kongwudhikunakorn, and Theerawit Wilaiprasitporn. 2019. Consumer grade EEG measuring sensors as research tools: A review. IEEE Sensors Journal (2019).","journal-title":"IEEE Sensors Journal"},{"key":"e_1_3_3_73_2","doi-asserted-by":"crossref","unstructured":"Javad Sohankar Koosha Sadeghi Ayan Banerjee and Sandeep K. S. Gupta. 2015. E-BIAS: A Pervasive EEG-Based Identification and Authentication System. 165\u2013172.","DOI":"10.1145\/2815317.2815341"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1016\/0013-4694(75)90263-1"},{"key":"e_1_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Shridatt Sugrim Can Liu Meghan McLean and Janne Lindqvist. 2019. Robust Performance Metrics for Authentication Systems.","DOI":"10.14722\/ndss.2019.23351"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.4103\/0972-6748.57865"},{"key":"e_1_3_3_77_2","unstructured":"I. Svogor and T. Kisasondi. 2012. Two factor authentication using EEG augmented passwords. 373\u2013378."},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1177\/2167696815587648"},{"key":"e_1_3_3_79_2","doi-asserted-by":"crossref","unstructured":"Kavitha P. Thomas A. P. Vinod et\u00a0al. 2017. EEG-based biometrie authentication using self-referential visual stimuli. 3048\u20133053.","DOI":"10.1109\/SMC.2017.8123093"},{"key":"e_1_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Julie Thorpe Paul C. van Oorschot and Anil Somayaji. 2005. Pass-thoughts: Authenticating with our minds. 45\u201356.","DOI":"10.1145\/1146269.1146282"},{"key":"e_1_3_3_81_2","first-page":"180","volume-title":"Lecture Notes in Computer Science","author":"Vliet Marijn van","year":"2010","unstructured":"Marijn van Vliet, Christian M\u00fchl, Boris Reuderink, and Mannes Poel. 2010. Guessing what\u2019s on your mind: Using the N400 in brain computer interfaces. In Lecture Notes in Computer Science. Vol. 6334 LNAI. Springer Berlin, Berlin, 180\u2013191."},{"key":"e_1_3_3_82_2","doi-asserted-by":"crossref","unstructured":"Marijn van Vliet Arne Robben Nikolay Chumerin Nikolay V. Manyakov Adrien Combaz and Marc M. Van Hulle. 2012. Designing a brain-computer interface controlled video-game using consumer grade EEG hardware. 6 pages.","DOI":"10.1109\/BRC.2012.6222186"},{"key":"e_1_3_3_83_2","doi-asserted-by":"crossref","unstructured":"Emanuel von Zezschwitz Alexander De Luca and Heinrich Hussmann. 2014. Honey I Shrunk the Keys: Influences of Mobile Devices on Password Composition and Authentication Performance. 10 pages.","DOI":"10.1145\/2639189.2639218"},{"key":"e_1_3_3_84_2","doi-asserted-by":"crossref","unstructured":"Emanuel Von Zezschwitz Anton Koslow Alexander De Luca and Heinrich Hussmann. 2013. Making graphic-based authentication secure against smudge attacks. 277\u2013286.","DOI":"10.1145\/2449396.2449432"},{"key":"e_1_3_3_85_2","unstructured":"W3C. 2020. Web Authentication: An API for accessing Public Key Credentials Level 2. W3C Candidate Recommendation Snapshot. https:\/\/www.w3.org\/TR\/webauthn-2\/."},{"key":"e_1_3_3_86_2","doi-asserted-by":"crossref","unstructured":"Frederick W. Wheeler Richard L. Weiss and Peter H. Tu. 2010. Face recognition at a distance system for surveillance applications. 8 pages.","DOI":"10.1109\/BTAS.2010.5634523"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195388855.001.0001"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18020335"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4580-6"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2017.2682115"},{"key":"e_1_3_3_91_2","first-page":"129","volume-title":"Brain Informatics","author":"Yap Hui-yen","year":"2017","unstructured":"Hui-yen Yap, Yun-huoy Choo, and Wee-how Khoh. 2017. Overview of acquisition protocol in EEG based recognition system. In Brain Informatics, Zeng et al. (Ed.). Vol. 10654. Springer, Cham, Switzerland, 129\u2013138."},{"issue":"4","key":"e_1_3_3_92_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3393619","article-title":"DeepKey: A multimodal biometric authentication system via deep decoding gaits and brainwaves","volume":"11","author":"Zhang Xiang","year":"2020","unstructured":"Xiang Zhang, Lina Yao, Chaoran Huang, Tao Gu, Zheng Yang, and Yunhao Liu. 2020. DeepKey: A multimodal biometric authentication system via deep decoding gaits and brainwaves. ACM Transactions on Intelligent Systems and Technology (TIST) 11, 4 (2020), 1\u201324.","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T12:05:45Z","timestamp":1728734745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,13]]},"references-count":91,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,30]]}},"alternative-id":["10.1145\/3579356"],"URL":"https:\/\/doi.org\/10.1145\/3579356","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2023,3,13]]},"assertion":[{"value":"2022-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}