{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:32Z","timestamp":1725494432459},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_40","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"457-459","source":"Crossref","is-referenced-by-count":0,"title":["Identification Now and in the Future: Social Grant Distribution Process in South Africa"],"prefix":"10.1007","author":[{"given":"Stephen","family":"Flowerday","sequence":"first","affiliation":[]},{"given":"Gideon","family":"Ranga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"InfoSA. (2005). About South Africa, 2005. Available from:< http:\/\/www.southafrica.info\/ess_info\/sa_glance\/social_delivery\/social_grants.htm > [Accessed: 15 August 2006]."},{"key":"40_CR2","unstructured":"Rusere, L. (2006). AllPay Social Grant Distribution Company. East London, South Africa."},{"key":"40_CR3","unstructured":"de Jongh, A. (2006). AllPay Distribution Company. East London, South Africa"},{"key":"40_CR4","unstructured":"Macocozoma, B. (2006). Deal House Social Grant Distribution Company. East London, South Africa."},{"key":"40_CR5","unstructured":"Fidis, (2006). ID-related Crime: Towards a Common Ground for Interdisciplinary Research. Future of Identity in the Information Society. White Paper, fidis-wp5-del5-2b.ID-related.crime.doc."},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Madsen, P. Koga, Y. & Takahashi, K. (2005). Federated Identity Management For Protecting Users from ID Theft. Computer-Communications Networks.","DOI":"10.1145\/1102486.1102500"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Ahn, G. & Lam, J. (2005). Managing Privacy for Federated Identity Management. Communications of ACM.","DOI":"10.1145\/1102486.1102492"},{"key":"40_CR8","unstructured":"Josang, A. Fabre, J. Hay, B. Dalziel, J. & Pope, S. (2004). Trust Requirements in Identity Management. Distributed Systems Technology."},{"key":"40_CR9","first-page":"269","volume":"1","author":"J. Wayman","year":"2000","unstructured":"Wayman, J. (2000). Picking the best Biometric Authentication Technologies. National Biometric Test Center Collected Works, vol. 1, pg, 269\u2013275.","journal-title":"National Biometric Test Center Collected Works"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T04:58:48Z","timestamp":1556945928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_40","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}