{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:56:05Z","timestamp":1725893765956},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387779959"},{"type":"electronic","value":"9780387779966"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-77996-6_8","type":"book-chapter","created":{"date-parts":[[2008,5,29]],"date-time":"2008-05-29T02:26:18Z","timestamp":1212027978000},"page":"91-102","source":"Crossref","is-referenced-by-count":0,"title":["BASE: a Proposed Secure Biometric Authentication System"],"prefix":"10.1007","author":[{"given":"Colby G.","family":"Crossingham","sequence":"first","affiliation":[]},{"given":"Sebastian H.","family":"Solms","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"8_CR1_8","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S Halevi","year":"1999","unstructured":"Halevi, S. and H. Krawczyk, Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC), 1999. 2(3): p. 230-268.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"8_CR2_8","doi-asserted-by":"crossref","unstructured":"Sukhai, N.B., Access control & biometrics. Information Security Curriculum Development, 2004: p. 124-127.","DOI":"10.1145\/1059524.1059552"},{"key":"8_CR3_8","first-page":"56","volume":"149","author":"F Tari","year":"2006","unstructured":"Tari, F., A.A. Ozok, and S.H. Holden, A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. ACM International Conference Proceeding Series, 2006. 149: p. 56-66.","journal-title":"ACM International Conference Proceeding Series"},{"key":"8_CR4_8","doi-asserted-by":"crossref","unstructured":"Gupta, P., et al. Architectures for cryptography and security applications: Efficient fingerprint-based user authentication for embedded systems. in Proceedings of the 42nd annual conference on Design automation DAC '05. 2005.","DOI":"10.1145\/1065579.1065643"},{"issue":"4","key":"8_CR5_8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/271019.271023","volume":"31","author":"S Xu","year":"1997","unstructured":"Xu, S., G. Zhang, and H. Zhu, On the Properties of Cryptographic Protocols and the Weaknesses of BAN-like logics. ACM SIGOPS Operating Systems Review, 1997. 31(4): p. 12-23.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"1","key":"8_CR6_8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"MK Khan","year":"2007","unstructured":"Khan, M.K. and J. Zhang, Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards & Interfaces, 2007. 29(1): p. 82-85.","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"8_CR7_8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/958965.958969","volume":"37","author":"HS Kim","year":"2003","unstructured":"Kim, H.S., S.W. Lee, and K.Y. Yoo, ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 2003. 37(4): p. 32-41.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"1","key":"8_CR8_8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.cose.2006.12.008","volume":"26","author":"C Roberts","year":"2007","unstructured":"Roberts, C., Biometric attack vectors and defences. Computers & Security, 2007. 26(1): p. 14-25.","journal-title":"Computers & Security"},{"issue":"4","key":"8_CR9_8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y Ding","year":"1995","unstructured":"Ding, Y. and P. Horster, Undetectable on-line password guessing attacks. ACM SIGOPS Operating Systems Review, 1995. 29(4): p. 77-86.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"1","key":"8_CR10_8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"C-H Lin","year":"2004","unstructured":"Lin, C.-H. and Y.-Y. Lai, A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 2004. 27(1): p. 19-23.","journal-title":"Computer Standards & Interfaces"}],"container-title":["The International Federation for Information Processing","Policies and Research in Identity Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-77996-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:23:05Z","timestamp":1619670185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-77996-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387779959","9780387779966"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-77996-6_8","relation":{},"subject":[]}}