{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:26:19Z","timestamp":1725553579378},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340720"},{"type":"electronic","value":"9783540340744"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751588_99","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T09:53:45Z","timestamp":1147341225000},"page":"954-963","source":"Crossref","is-referenced-by-count":2,"title":["Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments"],"prefix":"10.1007","author":[{"given":"He","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[]},{"given":"Kyungho","family":"Son","sequence":"additional","affiliation":[]},{"given":"Wansuk","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"99_CR1","unstructured":"Cerqueira, R., Hess, C.K., Roman, M., Campbell, R.H.: Gaia: A Development Infrastructure for Active Spaces. In: Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP 2001) (September 2001)"},{"key":"99_CR2","doi-asserted-by":"crossref","unstructured":"Al-Muhtadi, J., Ranganathan, A., Campbell, R., Dennis Mickunas, M.: Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: Proceedings, 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2002), pp. 771\u2013776 (July 2002)","DOI":"10.1109\/ICDCSW.2002.1030861"},{"key":"99_CR3","unstructured":"CC: ISO\/IEC 15408 Information technology - Security technology - Evaluation criteria for IT security V2.3 (August 2005)"},{"key":"99_CR4","unstructured":"CEM: ISO\/IEC 18045 Common Methodology for Information Technology Security Evaluation V2.3 (August 2005)"},{"key":"99_CR5","unstructured":"Cray Incorporated. Cray UNICOS\/mp Operating System Version 2.4.15 on Cray X1 hardware Security Target (August 2004), \n                    \n                      http:\/\/www.commoncriteriaportal.org"},{"key":"99_CR6","unstructured":"Certification body of the BSI, Functionality classes and evaluation methodology for deterministic random number generators, Application Notes and Interpretation of the Scheme(AIS) (December 1999)"},{"key":"99_CR7","unstructured":"Common Criteria Biometric Evaluation Methodology Working Group, Biometric Evaluation Methodology (August 2002)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751588_99.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:59:23Z","timestamp":1619492363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751588_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340720","9783540340744"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11751588_99","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}