{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:28:38Z","timestamp":1754396918908,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319707419"},{"type":"electronic","value":"9783319707426"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70742-6_33","type":"book-chapter","created":{"date-parts":[[2017,12,30]],"date-time":"2017-12-30T15:59:36Z","timestamp":1514649576000},"page":"353-363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Exploring the Feasibility to Authenticate Users of Web and Cloud Services Using a Brain-Computer Interface (BCI)"],"prefix":"10.1007","author":[{"given":"Michael Philip","family":"Orenda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3868-0481","authenticated-orcid":false,"given":"Lalit","family":"Garg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8489-1266","authenticated-orcid":false,"given":"Gaurav","family":"Garg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,31]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.chb.2013.09.018","volume":"31","author":"G Al-Hudhud","year":"2014","unstructured":"Al-Hudhud, G., Alzamel, M., Alattas, E., Alwabil, A.: Using brain signals patterns for biometric identity verification systems. Comput. Hum. Behav. 31, 224\u2013229 (2014)","journal-title":"Comput. Hum. Behav."},{"issue":"7","key":"33_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MC.2012.233","volume":"45","author":"P Campisi","year":"2012","unstructured":"Campisi, P., La Rocca, D., Scarano, G.: EEG for automatic person recognition. Computer 45(7), 87\u201389 (2012)","journal-title":"Computer"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Conklin, A., Dietrich, G., Walz, D.: Password-based authentication: a system perspective. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 10 (2004)","DOI":"10.1109\/HICSS.2004.1265412"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Constantin, L.: US govt\u2019s OPM underestimated the number of stolen fingerprints by 4.5 million, Cio (13284045), p. 1 (2015)","DOI":"10.1016\/S0969-4765(15)30145-4"},{"key":"33_CR5","unstructured":"Cpanel.emotivinsight.com.: API Reference, https:\/\/cpanel.emotivinsight.com\/BTLE-\/api.htm. Accessed 24 Sep 2016"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Dospinescu, O., Popa, I.: Face detection and face recognition in android mobile applications. Informatica Economica 20(1), 20\u201328 (2016). Business Source Complete","DOI":"10.12948\/issn14531305\/20.1.2016.02"},{"key":"33_CR7","unstructured":"Emotiv.: About Emotiv, http:\/\/emotiv.com\/about-emotiv\/. Accessed 25 June 2016"},{"key":"33_CR8","unstructured":"Emotiv 2.: Image of Emotive Insight Brainwear, https:\/\/i1.wp.com\/www.emotiv.com\/wp-content\/uploads\/2016\/04\/emotiv-insight-square-w.jpg. Accessed 26 Sep 2016"},{"issue":"1","key":"33_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jneumeth.2013.02.015","volume":"215","author":"G Garg","year":"2013","unstructured":"Garg, G., Prasad, G., Coyle, D.: Gaussian Mixture Model-based noise reduction in resting state fMRI data. J. Neurosci. Methods 215(1), 71\u201377 (2013)","journal-title":"J. Neurosci. Methods"},{"key":"33_CR10","unstructured":"Kerner, S.M.: OPM says far more fingerprint data stolen than first reported. Eweek, 1 (2015). Business Source Complete"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Katona, J., Kovari, A.: EEG-based computer control interface for brain-machine interaction. Int. J. Online Eng. 11(6), 43\u201348 (2015). Computers & Applied Sciences Complete","DOI":"10.3991\/ijoe.v11i6.5119"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Nasirinejad, M., Yazdi, A.: SASy username and password management on the cloud. In: Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, pp. 242\u2013246 (2012)","DOI":"10.1109\/CyberSec.2012.6246084"},{"issue":"2","key":"33_CR13","doi-asserted-by":"publisher","first-page":"253","DOI":"10.7906\/indecs.14.2.14","volume":"14","author":"M Novak","year":"2016","unstructured":"Novak, M., \u0160vogor, I.: Current usage of component based principles for developing web applications with frameworks: a literature review. Interdisc. Description Complex Syst. 14(2), 253\u2013276 (2016)","journal-title":"Interdisc. Description Complex Syst."},{"key":"33_CR14","unstructured":"O\u2019Gorman, L.: Fingerprint verification. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics, pp. 43\u201364. Springer, Boston (1996)"},{"issue":"01","key":"33_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1142\/S0129065708001373","volume":"18","author":"R Palaniappan","year":"2008","unstructured":"Palaniappan, R.: Two-stage biometric authentication method using thought activity brain waves. Int. J. Neural Syst. 18(01), 59\u201366 (2008)","journal-title":"Int. J. Neural Syst."},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Prakash, A., Rogers, W.: Why some humanoid faces are perceived more positively than others: effects of human-likeness and task. Int. J. Soc. Robot. 7(2), 309\u2013331 (2015). PsycINFO","DOI":"10.1007\/s12369-014-0269-4"},{"issue":"1","key":"33_CR17","first-page":"69","volume":"52","author":"TL Schultz","year":"2012","unstructured":"Schultz, T.L.: Technical tips: mri compatible eeg electrodes: advantages, disadvantages, and financial feasibility in a clinical setting. Neurodiagnostic J. 52(1), 69\u201381 (2012)","journal-title":"Neurodiagnostic J."},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Shyam, R., Singh, Y.: Multialgorithmic frameworks for human face recognition. J. Electr. Comput. Eng., 1\u20139 (2016). Academic Search Complete","DOI":"10.1155\/2016\/4645971"},{"key":"33_CR19","unstructured":"Sommerville, I.: Software Engineering, pp. 452\u2013478. Pearson, Boston (2011)"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Thorpe, J., Van Oorschot, P., Somayaji, A.: Pass-thoughts. In: Proceedings of the 2005 Workshop on New Security Paradigms - NSPW 2005 (2005)","DOI":"10.1145\/1146269.1146282"},{"key":"33_CR21","unstructured":"Yang, S.: The use of EEG signals for biometric person recognition, Doctoral dissertation, University of Kent (2015)"},{"issue":"1","key":"33_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1475-925X-14-1","volume":"14","author":"K Yoon Jae","year":"2015","unstructured":"Yoon Jae, K., Sung Woo, P., Hong Gi, Y., Moon Suk, B., June Sic, K., Chun Kee, C., Sungwan, K.: A study on a robot arm driven by three-dimensional trajectories predicted from non-invasive neural signals. Biomed. Eng. Online 14(1), 1\u201319 (2015)","journal-title":"Biomed. Eng. Online"}],"container-title":["Lecture Notes in Computer Science","New Trends in Image Analysis and Processing \u2013 ICIAP 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70742-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,9]],"date-time":"2022-01-09T01:06:13Z","timestamp":1641690373000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70742-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319707419","9783319707426"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70742-6_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Analysis and Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Catania","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciap2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciap2017.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}