Cryptanalysis of the convex hull click human identification protocol, International Journal of Information Security, vol.12, issue.2, pp.83-96, 2013. ,
Low-cost electroencephalogram (eeg) based authentication, 5th International IEEE/EMBS Conference on Neural Engineering -NER, pp.442-445, 2011. ,
Eye-movements as a biometric, pp.780-789 ,
, , 2005.
Image understanding for iris biometrics: A survey, Computer Vision and Image Understanding, vol.110, issue.2, pp.281-307, 2008. ,
Memory, emotion, and pupil diameter: Repetition of natural scenes, Psychophysiology, vol.52, issue.9, pp.1186-1193, 2015. ,
Are passfaces more usable than passwords? a field trial investigation, pp.405-424, 2000. ,
A second look at the usability of click-based graphical passwords, Proceedings of the 3rd Symposium on Usable Privacy and Security. pp. 1-12. SOUPS '07, 2007. ,
A survey on biometrics and cancelable biometrics systems, International Journal of Image and Graphics, vol.18, 2018. ,
Do Only The Eyes Have It? Predicting Subsequent Memory with Simultaneous Neural and Pupillometry Data, 2015. ,
Passthoughts authentication with low cost EarEEG, IEEE 38th Annual International Conference of the Engineering in Medicine and Biology Society -EMBC, pp.1979-1982, 2016. ,
Eeg biometrics using visual stimuli: A longitudinal study, IEEE Signal Processing Letters, vol.23, issue.3, pp.341-345, 2016. ,
Gaze trajectory as a biometric modality, Biosignals. pp, pp.335-341, 2011. ,
The Pupil as Marker of Cognitive Processes, pp.141-169, 2017. ,
The coupon collector's problem. Materials matemàtics pp, pp.1-35, 2014. ,
A new gaze analysis based soft-biometric, Pattern Recognition, pp.136-144, 2013. ,
Eye movement analysis for human authentication: a critical survey, Pattern Recognition Letters, vol.84, pp.272-283, 2016. ,
Consumer attitudes about biometric authentication, 2018. ,
Will any password do? Exploring ratelimiting on the web, Who Are You ?! Adventures in Authentication, 2016. ,
The pupil as an indicator of unconscious memory: Introducing the pupil priming effect, Psychophysiology, vol.52, issue.6, pp.754-769, 2015. ,
Picture password: A visual login technique for mobile devices, 2003. ,
Personal choice and challenge questions: a security and usability assessment, Proceedings of the 5th Symposium on Usable Privacy and Security, vol.8, 2009. ,
Challenging challenge questions: An experimental analysis of authentication technologies and user behaviour, Policy & Internet, vol.2, issue.1, pp.99-115, 2010. ,
Recognition memory strength is predicted by pupillary responses at encoding while fixation patterns distinguish recollection from familiarity, The Quarterly Journal of Experimental Psychology, vol.64, issue.10, pp.1971-1989, 2011. ,
An efficient user authentication using captcha and graphical passwords -a survey, International Journal of Science and Research, p.123, 2014. ,
First eye movement verification and identification competition at btas 2012, IEEE 5th International Conference on Biometrics: Theory, Applications and Systems -BTAS, pp.195-202, 2012. ,
Extensions of the birthday surprise, Journal of Combinatorial Theory, vol.3, issue.3, pp.279-282, 1967. ,
Evaluating liveness by face images and the structure tensor, IEEE 4th Workshop on Automatic Identification Advanced Technologies -AutoID, pp.75-80, 2005. ,
Shoulder surfing attack in graphical password authentication, International Journal of Computer Science and Information Security -IJCSIS, vol.6, issue.2, 2009. ,
Cancelable fingerprint templates using minutiae-based bit-strings, Journal of network and computer applications, vol.33, issue.3, pp.236-246, 2010. ,
The History of Information Security: A Comprehensive Handbook, 2007. ,
Eye fixations and recognition memory for pictures, Cognitive Psychology, vol.3, issue.4, pp.525-551, 1972. ,
Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation, vol.29, 2007. ,
Improved cancelable fingerprint templates using minutiae-based functional transform, Security and Communication Networks, vol.7, issue.10, pp.1543-1551, 2014. ,
Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, vol.6, pp.156-163, 1967. ,
, , pp.80067-80074
Pupil size signals novelty and predicts later retrieval success for declarative memories of natural scenes, Journal of vision, vol.13, issue.2, pp.11-11, 2013. ,
Scanpaths in saccadic eye movements while viewing and recognizing patterns, Vision Research, vol.11, issue.9, 1971. ,
Travel password: A secure and memorable password scheme, Intelligent Information and Database Systems: 6th Asian Conference -ACIIDS, pp.402-411, 2014. ,
Task load estimation and mediation using psychophysiological measures, Proceedings of the 21st International Conference on Intelligent User Interfaces, pp.48-59, 2016. ,
Eye movement latencies for parafoveally presented words, Bulletin of the Psychonomic Society, vol.11, issue.1, pp.13-16, 1978. ,
A new antispoofing approach for biometric devices, vol.4, pp.328-365, 2008. ,
Towards a multi-source fusion approach for eye movement-driven recognition, Information Fusion, vol.32, pp.13-25, 2016. ,
Biometric attack vectors and defences, Computers & Security, vol.26, issue.1, pp.14-25, 2007. ,
It's no secret. measuring the security and reliability of authentication via "secret" questions, 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009. ,
Diversify to survive: Making passwords stronger with adaptive policies, 13th Symposium on Usable Privacy and Security -SOUPS, pp.1-12, 2017. ,
Understanding considerate systems -UCS (pronounced: You see us), 2010 International Symposium on Collaborative Technologies and Systems, pp.1-12, 2010. ,
Integration of sound signature in graphical password authentication system, International Journal of Computer Applications, vol.12, issue.9, pp.11-13, 2011. ,
Using reflexive eye movements for fast challenge-response authentication, Proceedings of the, 2016. ,
, ACM SIGSAC Conference on Computer and Communications Security, pp.1056-1067, 2016.
Passpoints: Design and longitudinal evaluation of a graphical password system, International journal of human-computer studies, vol.63, issue.1-2, pp.102-127, 2005. ,
Cognitive passwords: The key to easy access control, Computers & Security, vol.9, issue.8, pp.723-736, 1990. ,