{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:30:06Z","timestamp":1725485406629},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443094"},{"type":"electronic","value":"9783540458319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45831-x_1","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T19:19:06Z","timestamp":1180811946000},"page":"1-18","source":"Crossref","is-referenced-by-count":4,"title":["Biometric Authentication in Infrastructure Security"],"prefix":"10.1007","author":[{"given":"John","family":"Armington","sequence":"first","affiliation":[]},{"given":"Purdy","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Koznek","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Martinez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"B. Schneier, \u201cBiometrics: Uses and Abuses,\u201d Inside Risks 110, Communications of the ACM, vol. 42, no. 8, August 1999, http:\/\/www.counterpane.com\/insiderisks1.html .","DOI":"10.1145\/310930.310988"},{"key":"1_CR2","unstructured":"\u201cInternational Biometric Group,\u201d http:\/\/www.biometricgroup.com\/e\/biometric_market_report.htm ."},{"key":"1_CR3","unstructured":"\u201cBioAPI Consortium,\u201d http:\/\/www.bioapi.org ."},{"key":"1_CR4","unstructured":"\u201cInternational Biometrics Industry Association,\u201d http:\/\/www.ibia.org ."},{"key":"1_CR5","unstructured":"\u201cOASIS XML Common Biometric Format (XCBF) TC,\u201d http:\/\/www.oasisopen.org\/committees\/xcbf\/ ."},{"key":"1_CR6","unstructured":"T. Mansfield et al, \u201cBiometric Product Testing Final Report,\u201d Center for Mathematics and Science Computing, National Physics Lab, CESG\/BWG 2001, 2001, http:\/\/www.cesg.gov.uk\/technology\/biometrics\/media\/Biometric%20Test%20Report%20pt1.pdf ."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"J. Campbell, \u201cSpeaker recognition: A tutorial,\u201d Proceedings of the IEEE, vol. 85, no. 9, 1997.","DOI":"10.1109\/5.628714"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"J. Naik, \u201cSpeaker verification: A tutorial,\u201d IEEE Communications Magazine, 1990.","DOI":"10.1109\/35.46670"},{"key":"1_CR9","unstructured":"M. Carey and R. Auckenthaler, \u201cUser Validation for Mobile Phones,\u201d in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2000."},{"key":"1_CR10","unstructured":"\u201cVeriVoice Secure Lock,\u201d http:\/\/www.verivoice.com\/verivoice_sl.htm ."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"R. Chellapa, C. Wilson, and S. Sirohey, \u201cHuman and machine recognition of faces: A Survey,\u201d Proceedings of the IEEE, vol. 83, no. 5, pp. 705\u2013741, 1995.","DOI":"10.1109\/5.381842"},{"key":"1_CR12","unstructured":"\u201cViisage Corporation,\u201d http:\/\/www.viisage.com ."},{"key":"1_CR13","unstructured":"\u201cVisionics Corporation,\u201d http:\/\/www.visionics.com ."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"M. Turk and A. Pentland, \u201cFace recognition using eigenfaces,\u201d in Proc. IEEE Conference on Computer Vision and Pattern Recognition, 1991, pp. 586\u2013591.","DOI":"10.1109\/CVPR.1991.139758"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1088\/0954-898X\/7\/3\/002","volume":"7","author":"P. Penev","year":"1996","unstructured":"P. Penev and J. Atick, \u201cLocal Feature Analysis: A General Statistical Theory for Object Representation,\u201d Network: Computation in Neural Systems, vol. 7, pp. 477\u2013500, 1996.","journal-title":"Network: Computation in Neural Systems"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"A. Jain et al, \u201cTwin Test: On Discriminability of Fingerprints,\u201d in Proc. 3rd International Conference on Audio-and Video-Based Person Authentication, Sweden, 2001, pp. 211\u2013216.","DOI":"10.1007\/3-540-45344-X_30"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, \u201cImpact of Artificial Gummy Fingers on Fingerprint Systems,\u201d in Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, January 2002.","DOI":"10.1117\/12.462719"},{"key":"1_CR18","unstructured":"\u201cFinger-scan Vendors,\u201d http:\/\/www..nger-scan.com\/finger-scan_vendors.htm ."},{"key":"1_CR19","unstructured":"J. Daugman, \u201cHow Iris Recognition Works,\u201d http:\/\/www.cl.cam.ac.uk\/users\/jgd1000\/irisrecog.pdf ."},{"key":"1_CR20","unstructured":"\u201cInternational Biometric Group, Iris Recognition: The Technology,\u201d http:\/\/www.iris-scan.com\/iris_technology.htm ."},{"key":"1_CR21","unstructured":"J. Daugman, \u201cTest Reports on the Daugman\u2019s Algorithms,\u201d http:\/\/www.cl.cam.ac.uk\/users\/jgd1000\/iristests.pdf ."},{"key":"1_CR22","unstructured":"J. Daugman, \u201cCountermeasures against Subterfuge,\u201d http:\/\/www.cl.cam.ac.uk\/users\/jgd1000\/countermeasure.gif ."},{"key":"1_CR23","unstructured":"G. Williams, \u201cIris Recognition Technology,\u201d Iridian Technologies, 2001, http:\/\/www.politec.com\/press%20info\/white%20papers\/Iris%20Recgnition.pdf ."},{"key":"1_CR24","unstructured":"\u201cIridian Technologies,\u201d http:\/\/www.iridiantech.com ."},{"key":"1_CR25","unstructured":"T. B. Batra, \u201cHebrew English edition of the Babylonian Talmud,\u201d vol. 1, pp. 22."},{"key":"1_CR26","volume-title":"Privacy on the Line, The Politics of Wiretapping and Encryption","author":"D. Whitfield","year":"1998","unstructured":"D. Whitfield and S. Landau, Privacy on the Line, The Politics of Wiretapping and Encryption, The MIT Press, Cambridge, Massachusetts, 1998."},{"key":"1_CR27","volume-title":"Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing","author":"T. Forester","year":"1993","unstructured":"T. Forester and P. Morrison, Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, The MIT Press, Cambridge, Massachusetts, 1993."},{"key":"1_CR28","unstructured":"J. Ross, \u201cSecurity Cameras In Banks, Private Business Ruled Illegal In Canada,\u201d The Ottawa Citizen, http:\/\/www.rense.com\/general12\/sec.htm ."},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"P. Ho, \u201cA Handset Identifier Using Support Vector Machine,\u201d in Proc. IEEE International Conference on Spoken Language Processing, Denver, CO, USA, 2002.","DOI":"10.21437\/ICSLP.2002-632"},{"key":"1_CR30","unstructured":"J. Beckett, \u201cHP + Swatch = Web Watch,\u201d November 1999, http:\/\/www.hpl.hp.com\/news\/swatch.html ."}],"container-title":["Lecture Notes in Computer Science","Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45831-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:30:01Z","timestamp":1683851401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45831-X_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443094","9783540458319"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-45831-x_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}