DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gondesen, Florian | - |
dc.contributor.author | Marx, Matthias | - |
dc.contributor.author | Gollmann, Dieter | - |
dc.date.accessioned | 2020-02-05T16:00:33Z | - |
dc.date.available | 2020-02-05T16:00:33Z | - |
dc.date.issued | 2018-10-24 | - |
dc.identifier.citation | Biometric-Based Physical and Cybersecurity Systems: 287-318 (2018-10-24) | de_DE |
dc.identifier.isbn | 978-331998734-7 | de_DE |
dc.identifier.uri | http://hdl.handle.net/11420/4765 | - |
dc.description.abstract | We analyze the current state of research on EEG-based biometrics, giving an overview of the equipment available, together with practical guidance on the design of EEG-based authentication systems, of the authentication paradigms proposed, and of the empirical evaluations reported in the research literature. We conclude that EEG-based biometrics is still far from becoming a practical proposition. In particular, the time it takes to perform EEG-based user authentication is far above the time for competing biometric authentication schemes, and the number of subjects used in empirical evaluations tends to be too small to generalize results to larger populations. | en |
dc.language.iso | en | de_DE |
dc.title | EEG-based biometrics | de_DE |
dc.type | inBook | de_DE |
dc.type.dini | bookPart | - |
dcterms.DCMIType | Text | - |
tuhh.abstract.english | We analyze the current state of research on EEG-based biometrics, giving an overview of the equipment available, together with practical guidance on the design of EEG-based authentication systems, of the authentication paradigms proposed, and of the empirical evaluations reported in the research literature. We conclude that EEG-based biometrics is still far from becoming a practical proposition. In particular, the time it takes to perform EEG-based user authentication is far above the time for competing biometric authentication schemes, and the number of subjects used in empirical evaluations tends to be too small to generalize results to larger populations. | de_DE |
tuhh.publisher.doi | 10.1007/978-3-319-98734-7_11 | - |
tuhh.publication.institute | Sicherheit in verteilten Anwendungen E-15 | de_DE |
tuhh.type.opus | InBuch (Kapitel / Teil einer Monographie) | - |
dc.type.driver | bookPart | - |
dc.type.casrai | Book Chapter | - |
tuhh.container.startpage | 287 | de_DE |
tuhh.container.endpage | 318 | de_DE |
item.grantfulltext | none | - |
item.openairetype | inBook | - |
item.fulltext | No Fulltext | - |
item.languageiso639-1 | en | - |
item.creatorOrcid | Gondesen, Florian | - |
item.creatorOrcid | Marx, Matthias | - |
item.creatorOrcid | Gollmann, Dieter | - |
item.cerifentitytype | Publications | - |
item.creatorGND | Gondesen, Florian | - |
item.creatorGND | Marx, Matthias | - |
item.creatorGND | Gollmann, Dieter | - |
item.openairecristype | http://purl.org/coar/resource_type/c_3248 | - |
crisitem.author.dept | Sicherheit in verteilten Anwendungen E-15 | - |
crisitem.author.dept | Sicherheit in verteilten Anwendungen E-15 | - |
crisitem.author.orcid | 0000-0001-6174-8854 | - |
crisitem.author.parentorg | Studiendekanat Elektrotechnik, Informatik und Mathematik | - |
crisitem.author.parentorg | Studiendekanat Elektrotechnik, Informatik und Mathematik | - |
Appears in Collections: | Publications without fulltext |
Add Files to Item
Note about this record
Export
Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.