References
- Wikipedia, "Authentication," [Online]. Available: https://en.wikipedia.org/wiki/Authentication.
- H. Berger, "Uber das electrenkephalogramm des menschen," Archiv fur Psychiatrie und Nervenkrankheiten, vol. 87, no. 1, pp. 527-570, 1929. https://doi.org/10.1007/BF01797193
- T. A. Travis, C. Y. Kondo, and J. R. Knott, "Alpha enhancement research: a review," Biological Psychiatry, vol. 10, no. 1, pp. 69-89, 1975.
- B. Rockstroh, T. Elbert, A. Canavan, W. Lutzenberger, and N. Birbaumer, Slow Cortical Potentials and Behavior, 2nd ed. Baltimore, MD: Urban & Schwarzenberg, 1989.
- M. B. Sterman, "Basic concepts and clinical findings in the treatment of seizure disorders with EEG operant conditioning," Clinical Electroencephalography, vol. 31, no. 1, pp. 45-55, 2000. https://doi.org/10.1177/155005940003100111
- H. J. Hwang, S. Kim, S. Choi, and C. H. Im, EEG-based brain-computer interfaces: a thorough literature survey, International Journal of Human-Computer Interaction, vol. 29, no. 12, pp. 814-826, 2013. https://doi.org/10.1080/10447318.2013.780869
- H. J. Hwang, J. H. Lim, Y. J. Jung, H. Choi, S. W. Lee, and C. H. Im, "Development of an SSVEP-based BCI spelling system adopting a QWERTY-style LED keyboard," Journal of Neuroscience Methods, vol. 208, no. 1, pp. 59-65, 2012. https://doi.org/10.1016/j.jneumeth.2012.04.011
- I. Volosyak, "SSVEP-based Bremen-BCI interface--boosting information transfer rates," Journal of Neural Engineering, vol. 8, no. 3, 036020, 2011.
- G. Blonder, "Graphical passwords," U.S. Patent 5559961, Sep 24, 1996.
- R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, no. 1, pp. 156-163, 1967. https://doi.org/10.1016/S0022-5371(67)80067-7
- A. Paivio, T. B. Rogers, and P. C. Smythe, "Why are pictures easier to recall than words?," Psychonomic Science, vol. 11, no. 4, pp. 137-138, 1976. https://doi.org/10.3758/BF03331011
- A. E. Dirik, N. Memon, and J. C. Birget, "Modeling user choice in the PassPoints graphical password scheme," in Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, 2007, pp. 20-28.
- D. Hong, S. Man, B. Hawes, and M. Mathews, "A graphical password scheme strongly resistant to spyware," in Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, 2004, pp. 94-100.
- R. Dhamija and A. Perrig, "Deja vu: a user study using images for authentication," in Proceedings of the 9th USENIX Security Symposium, Denver, CO, 2000, pp. 45-58.
- A. Perrig and D. Song, "Hash visualization: a new technique to improve real-world security," in Proceedings of International Workshop on Cryptographic Techniques and E-Commerce, Hong Kong, China, 1999, pp. 131-138.
- S. Akula and V. Devisetty, "Image based registration and authentication system," in Proceedings of Midwest Instruction and Computing Symposium, Morris, MN, 2004.
- D. Weinshall and S. Kirkpatrick, "Passwords you'll never forget, but can't recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI), Vienna, Austria, 2004, pp. 1399-1402.
- W. Jansen, "Authenticating mobile device users through image selection," in The Internet Society: Advances in Learning, Commerce and Security. Southampton, UK: WIT Press, 2004, pp. 184-192
- I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," in Proceedings of the 8th USENIX Security Symposium, Washington, DC, 1999.
- A. F. Syukri, E. Okamoto, and M. Mambo, "A user identification system using signature written with mouse," in Information Security and Privacy. Berlin: Springer, 1998, pp. 403-414.
- S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, vol. 63, no. 1-2, pp. 102-127, 2005. https://doi.org/10.1016/j.ijhcs.2005.04.010
- S. Brostoff and M. A. Sasse, "Are passfaces more usable than passwords? A field trial investigation," in People and Computers XIV - Usability or Else. London, UK: Springer, 2000, pp. 405-424.
- M. Boroditsky, "Passlogix password schemes," 2002 [Online]. Available: http://www.passlogix.com.
- G. C. Yang, "PassPositions: a secure and user-friendly graphical password scheme," in Proceedings of 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-5.
- G. C. Yang and H. Oh, "Implementation of a graphical password authentication system 'PassPositions'," Journal of Image and Graphics, vol. 6, no. 2. pp. 117-121, 2018. https://doi.org/10.18178/joig.6.2.117-121
- G. C. Yang, "A new graphical password system using intersecting points in a signature," International Journal of Engineering & Technology, vol. 7, no. 4.39, pp. 61-64, 2018.
- G. C. Yang, "T-TIME: a password scheme based on touch signal generation time difference," Journal of Advanced Information Technology and Convergence, vol. 8, no. 2, pp.41-46, 2018. https://doi.org/10.14801/jaitc.2018.8.2.41
- G. C. Yang, "A multimodal password system based on graphics and text," Engineering Letters, vol. 28, no. 2, pp. 300-305, 2020.
- R. Biddle, S. Chiasson, and P. C. Van Oorschot, "Graphical passwords: learning from the first twelve years," ACM Computing Surveys (CSSUR), vol. 44, no. 4, article no. 19, 2012.
- G. C. Yang, "Development status and prospects of graphical password authentication system in Korea," KSII Transactions on Internet and Information Systems, vol. 13, no. 11, pp. 5755-5772, 2019. https://doi.org/10.3837/tiis.2019.11.026
- T. M. Li, H. C. Chao, and J. Zhang, "Emotion classification based on brain wave: a survey," Human-centric Computing and Information Sciences, vol. 9, Article no. 42, 2019.
- N. H. Keum, T. Lee, J. B. Lee, and H. P. "Measuring the degree of content immersion in a non-experimental environment using a portable EEG device," Journal of Information Processing Systems, vol. 14, no. 4, pp. 1049-1061, 2018. https://doi.org/10.3745/JIPS.04.0084
- T. Pedersen, C. Johansen, and A. Josang, "Behavioural computer science: an agenda for combining modelling of human and system behaviours," Human-centric Computing and Information Sciences, vol. 8, article no. 7, 2018.
- V. Suryani, S. Sulistyo, and W. Widyawan, "Two-phase security protection for the internet of things object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431-1437, 2018. https://doi.org/10.3745/JIPS.03.0106
- D. Nield, "Scientists have connected the brains of 3 people, enabling them to share thoughts," 2018 [Online]. Available: https://www.sciencealert.com/brain-to-brain-mind-connection-lets-three-people-share-thoughts.
- A. J. Casson, D. C. Yates, S. J. M. Smith, J. S. Duncan, and E. Rodriguez-Villegas, "Wearable electroencephalography," IEEE Engineering in Medicine and Biology Magazine, vol. 29, no. 3, pp. 44-56, 2010. https://doi.org/10.1109/MEMB.2010.936545
- F. Wang, G. Li, J. Chen, Y. Duan, and D. Zhang, "Novel semi-dry electrodes for brain-computer interface applications," Journal of Neural Engineering, vol. 13, no. 4, article no. 046021, 2016.