{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T18:56:20Z","timestamp":1770663380489,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030003074","type":"print"},{"value":"9783030003081","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00308-1_12","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T18:43:53Z","timestamp":1536259433000},"page":"143-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Haas","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Ulz","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Adi, W.: Mechatronic security and robot authentication. In: 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, pp. 77\u201382. IEEE (2009)","DOI":"10.1109\/BLISS.2009.30"},{"key":"12_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-04682-8","volume-title":"Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung $$\\cdot $$ Technologien $$\\cdot $$ Migration","author":"T Bauernhansl","year":"2014","unstructured":"Bauernhansl, T., Ten Hompel, M., Vogel-Heuser, B.: Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung $$\\cdot $$ Technologien $$\\cdot $$ Migration. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-658-04682-8"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications WBMA 2003, pp. 45\u201352. ACM (2003)","DOI":"10.1145\/982507.982516"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography","author":"H Gilbert","year":"2004","unstructured":"Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175\u2013193. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24654-1_13"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2014.07.013","volume":"54","author":"LA Grieco","year":"2014","unstructured":"Grieco, L.A., et al.: IoT-aided robotics applications: technological implications, target domains and open issues. Comput. Commun. 54, 32\u201347 (2014)","journal-title":"Comput. Commun."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Haller, N.: The S\/KEY one-time password system. In: Proceedings of the Internet Society Symposium on Network and Distributed Systems (1994)","DOI":"10.17487\/rfc1760"},{"issue":"11","key":"12_CR7","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TCE.2007.381763","volume":"53","author":"D Kim","year":"2007","unstructured":"Kim, D., Lee, J., Yoon, H.S., Cha, E.Y.: A non-cooperative user authentication system in robot environments. IEEE Trans. Consum. Electron. 53(2), 804\u2013811 (2007)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/978-3-540-30497-5_132","volume-title":"Computational and Information Science","author":"J Kim","year":"2004","unstructured":"Kim, J., Kim, G.S., Eom, Y.I.: Lightweight mobile agent authentication scheme for home network environments. In: Zhang, J., He, J.-H., Fu, Y. (eds.) CIS 2004. LNCS, vol. 3314, pp. 853\u2013859. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30497-5_132"},{"key":"12_CR10","volume-title":"Trusted Platform Module Basics: Using TPM in Embedded Systems","author":"SL Kinney","year":"2006","unstructured":"Kinney, S.L.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Newnes, Amsterdam (2006)"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1\u20135 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR12","unstructured":"Line, M.B., Nordland, O., R\u00f8stad, L., T\u00f8ndel, I.A.: Safety vs security? In: Proceedings of the 8th International Conference on Probabilistic Safety Assessment and Management (PSAM 2006), New Orleans, USA (2006)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"M\u2019Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: an HMAC-based one-time password algorithm. Technical report, RFC4226 (2005)","DOI":"10.17487\/rfc4226"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"M\u2019Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. Technical report, RFC6238 (2011)","DOI":"10.17487\/rfc6238"},{"key":"12_CR15","unstructured":"Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS), vol. 2005, pp. 1\u20138. Citeseer (2005)"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/978-3-319-42620-4_45","volume-title":"Automation, Communication and Cybernetics in Science and Engineering 2015\/2016","author":"T Niemueller","year":"2016","unstructured":"Niemueller, T., Ewert, D., Reuter, S., Ferrein, A., Jeschke, S., Lakemeyer, G.: RoboCup Logistics league sponsored by festo: a competitive factory automation testbed. In: Jeschke, S., Isenhardt, I., Hees, F., Henning, K. (eds.) Automation, Communication and Cybernetics in Science and Engineering 2015\/2016, pp. 605\u2013618. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42620-4_45"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Rajkumar, R.R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th Design Automation Conference, pp. 731\u2013736. ACM (2010)","DOI":"10.1145\/1837274.1837461"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Schneider, S., et al.: Design and development of a benchmarking testbed for the factory of the future. In: 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/ETFA.2015.7301423"},{"key":"12_CR19","volume-title":"The Fourth Industrial Revolution","author":"K Schwab","year":"2017","unstructured":"Schwab, K.: The Fourth Industrial Revolution. Penguin, London (2017)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th Workshop on Multimedia and Security, MM#38; Sec 2005, pp. 111\u2013116. ACM (2005)","DOI":"10.1145\/1073170.1073191"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436\u2013446. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11527923_45"},{"issue":"1","key":"12_CR22","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.arcontrol.2010.02.008","volume":"34","author":"D Zuehlke","year":"2010","unstructured":"Zuehlke, D.: SmartFactory - towards a factory-of-things. Ann. Rev. Control 34(1), 129\u2013138 (2010)","journal-title":"Ann. Rev. Control"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2017: Robot World Cup XXI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00308-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:04:08Z","timestamp":1662595448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-00308-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030003074","9783030003081"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00308-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RoboCup","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Robot World Cup","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nagoya","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"robocup2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.robocup2017.org\/eng\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,67","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,04","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9 other papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}