{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:40:24Z","timestamp":1755823224213,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Helmholtz Association (HGF)","award":["46.23 Engineering Secure Systems"],"award-info":[{"award-number":["46.23 Engineering Secure Systems"]}]},{"name":"Germany?s Excellence Strategy","award":["(EXC 2050\/1 ?CeTI?; ID 390696704"],"award-info":[{"award-number":["(EXC 2050\/1 ?CeTI?; ID 390696704"]}]},{"name":"Association (HGF) within topic ?46.23 Engineering Secure Systems?","award":["KASTEL Security Research Labs"],"award-info":[{"award-number":["KASTEL Security Research Labs"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3624399","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"3627-3629","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Towards Practical Brainwave-based User Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4315-9129","authenticated-orcid":false,"given":"Matin","family":"Fallahi","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7401-6185","authenticated-orcid":false,"given":"Patricia","family":"Arias-Cabarcos","sequence":"additional","affiliation":[{"name":"Paderborn University, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-9692","authenticated-orcid":false,"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579356"},{"volume-title":"30th {USENIX} Security Symposium.","author":"Arias-Cabarcos Patricia","key":"e_1_3_2_1_2_1","unstructured":"Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. In 30th {USENIX} Security Symposium."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101788"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_1"},{"key":"e_1_3_2_1_5_1","volume-title":"BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks. In 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 53--60","author":"Fallahi Matin","year":"2023","unstructured":"Matin Fallahi, Thorsten Strufe, and Patricia Arias-Cabarcos. 2023. BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks. In 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 53--60."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230632"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3397-1"},{"volume-title":"21st {USENIX} Security Symposium. 143--158.","author":"Martinovic Ivan","key":"e_1_3_2_1_8_1","unstructured":"Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, and Dawn Song. 2012. On the feasibility of side-channel attacks with brain-computer interfaces. In 21st {USENIX} Security Symposium. 143--158."},{"key":"e_1_3_2_1_9_1","volume-title":"Are both positive and negative items necessary in questionnaires. Retrieved June 20","author":"Sauro Jeff","year":"2011","unstructured":"Jeff Sauro. 2011. Are both positive and negative items necessary in questionnaires. Retrieved June 20 (2011), 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281745"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3624399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3624399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:48:22Z","timestamp":1755740902000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3624399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":10,"alternative-id":["10.1145\/3576915.3624399","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3624399","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}