{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:10:14Z","timestamp":1736295014785,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_16","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"211-226","source":"Crossref","is-referenced-by-count":2,"title":["Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions"],"prefix":"10.1007","author":[{"given":"Siraj A.","family":"Shaikh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christos K.","family":"Dimitriadis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"UMTS Security","author":"V. Neimi","year":"2003","unstructured":"Neimi, V., Nyberg, K.: UMTS Security. John Wiley & Sons, Chichester (2003)"},{"key":"16_CR2","unstructured":"Benoit, O., Dabbous, N., Gauteron, L., Girard, P., Handschuh, H., Naccache, D., Socile, S., Whelan, C.: Mobile Terminal Security. Cryptology ePrint Archive Report 2004\/158"},{"key":"16_CR3","unstructured":"ISO\/IEC JTC1, SC37\/SG1: Biometric vocabulary corpus (2004)"},{"key":"16_CR4","first-page":"41","volume":"4","author":"C. Dimitriadis","year":"2004","unstructured":"Dimitriadis, C., Polemi, D.: Biometrics \u2013Risks and Controls. Information Systems Control Journal (ISACA)\u00a04, 41\u201343 (2004)","journal-title":"Information Systems Control Journal (ISACA)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Dimitriadis, C., Polemi, D.: A protocol for incorporating biometrics in 3G with respect to privacy. In: Fernandez-Medina, E., Hernandez, J., Garcia, J. (eds.) Proceedings of the 3rd International Workshop on Security in Information Systems (WOSIS 2005), pp. 123\u2013135 (2005)","DOI":"10.5220\/0002560701230135"},{"key":"16_CR6","unstructured":"3rd Generation Partnership Project: TS 33.102 - 3G Security; Security architecture (2004)"},{"key":"16_CR7","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall International, Englewood Cliffs (1985)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"16_CR9","unstructured":"3rd Generation Partnership Project: TS 22.022 - Personalisation of Mobile Equipment (ME); Mobile functionality specification (2005)"},{"key":"16_CR10","volume-title":"The Theory and Practice of Concurrency","author":"A.W. Roscoe","year":"1997","unstructured":"Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"16_CR11","volume-title":"Concurrent and Real-time Systems: the CSP Approach","author":"S. Schneider","year":"1999","unstructured":"Schneider, S.: Concurrent and Real-time Systems: the CSP Approach. Addison-Wesley, Reading (1999)"},{"key":"16_CR12","volume-title":"Modelling and Analysis of Security Protocols","author":"P. Ryan","year":"2001","unstructured":"Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)"},{"issue":"9","key":"16_CR13","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/32.713329","volume":"24","author":"S. Schneider","year":"1998","unstructured":"Schneider, S.: Verifying Authentication Protocols in CSP. IEEE Transactions on Software Engineering\u00a024(9), 741\u2013758 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"16_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:39:38Z","timestamp":1736293178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11734666_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}