2015
DOI: 10.1007/978-3-319-19258-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of Brain-Computer Interface Users in Network Applications

Abstract: Abstract. Cognitive biometrics aims to user authentication (or identification)by direct measure of electrophysiological signals as response to specific stimuli. In the literature, authentication paradigms for network applications are intended for healthy and independent users with complete control of their muscles. This excludes people with severe motor impairment, such as Brain-computer interface (BCI) users. Conversely, BCIs permit communication with users even in extreme impairment conditions, such as those… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Moreover, they are exceptionally secure as they have high complexity, and the stimulus is not in open view (as in the case of ERP protocols), ensuring hence complete defense against shoulder surfing attacks [47,67]. However, research suggests that they can cause mental fatigue on users [13], which can subsequently jeopardize the system's validity, since the resulting signals are directly affected by human mental fatigue [47]. Furthermore, they can become challenging to use for users who may favor more simple systems [13,77].…”
Section: Mental Activity Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, they are exceptionally secure as they have high complexity, and the stimulus is not in open view (as in the case of ERP protocols), ensuring hence complete defense against shoulder surfing attacks [47,67]. However, research suggests that they can cause mental fatigue on users [13], which can subsequently jeopardize the system's validity, since the resulting signals are directly affected by human mental fatigue [47]. Furthermore, they can become challenging to use for users who may favor more simple systems [13,77].…”
Section: Mental Activity Protocolsmentioning
confidence: 99%
“…device login), also due to their limited key space. Aiming to improve on the security within UA, recent research focuses on biometric traits that could be used in User Authentication (UA) systems [28,47]. For a biometric trait to be reliable in user authentication, it must comply with the following principles: Universality (every person has it), Uniqueness (unique among different users), Permanency (conserves its properties over time), Collectability (can be measured quantitatively), Performance (practical to collect and accurate to authenticate), Acceptability and Robustness against circumvention [3].…”
Section: Introductionmentioning
confidence: 99%