{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:44Z","timestamp":1725549344859},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_39","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"324-332","source":"Crossref","is-referenced-by-count":3,"title":["Biometrics to Enhance Smartcard Security"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Bistarelli","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Bechelli, L., Bistarelli, S., Frassi, S.: A protocol for simulating match-on-card authentication through the use of a template-on-card technology. Working draft"},{"key":"39_CR2","unstructured":"Bechelli, L., Bistarelli, S., Martinelli, F., Petrocchi, M., Vaccarelli, A.: Integrating biometric techniques with electronic signature for remote authentication. ERCIM News\u00a0(49) (2002)"},{"key":"39_CR3","unstructured":"Bechelli, L., Bistarelli, S., Vaccarelli, A.: Biometrics authentication with smartcard. Technical Report 08-2002, CNR, Istituto di Informatica e Telematica, Pisa (2002)"},{"key":"39_CR4","unstructured":"Bechelli, L., Bistarelli, S., Vaccarelli, A.: Certificati per impronte digitali memorizzati su smartcard. Technical Report 09-2002, CNR, Istituto di Informatica e Telematica, Pisa (2002) (in Italian)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Bella, G.: Inductive Verification of Smart Card Protocols, vol.\u00a011(1), pp. 87\u2013132 (2003)","DOI":"10.3233\/JCS-2003-11103"},{"key":"39_CR6","unstructured":"Bond, M., Zielinski, P.: Decimalisation table attacks for pin cracking. Technical Report UCAM-CL-TR-560, University of Cambridge, Computer Laboratory, feb (2003)"},{"key":"39_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1007\/3-540-48119-2_44","volume-title":"FM\u201999 - Formal Methods","author":"R. Focardi","year":"1999","unstructured":"Focardi, R., Martinelli, F.: A uniform approach for the definition of security properties. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 794\u2013813. Springer, Heidelberg (1999)"},{"key":"39_CR8","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-0-387-35528-3_14","volume-title":"Proceedings 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS)","author":"N.J. Henderson","year":"2000","unstructured":"Henderson, N.J., Hartel, P.H.: Pressure sequence - a novel method of protecting smart cards. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds.) Proceedings 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK, pp. 241\u2013256. Kluwer, Dordrecht (2000)"},{"key":"39_CR9","unstructured":"RSA Security Inc. Pkcs#11 v2.11: Cryptographic token interface standard. Technical Report PKCS#11 v2.11 r1, RSA Security Inc., RSA Security Inc. Public-Key Cryptographic Standard (PKCS) (November 2001)"},{"key":"39_CR10","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/3-540-45418-7_19","volume-title":"Smart Card Programming and Security","author":"B. Struif","year":"2001","unstructured":"Struif, B.: Use of biometrics for user verification in electronic signature smartcards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 220\u2013228. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:22Z","timestamp":1605644302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11542322_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}