This is on-going research at the intersection of cryptography, security, and brain and cognitive science. Your results may vary as we are still fine-tuning the training, testing, and analysis algorithms. Enjoy!
- This first stage of research revolves around the use of implicit learning for user authentication.
- First the user has to complete training. At the end of the training a user ID is assigned. The process takes between 30 and 60 minutes.
- Later, the user comes back for authentication. The user ID assigned in the training session has to be provided at the beginning. The authentication game takes about 15 minutes.
If you would like to learn more about this work, you can contact Prof. Dan Boneh at Stanford University or Prof. Paul Reber at Northwestern University.