{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:48:18Z","timestamp":1726040898390},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030290283"},{"type":"electronic","value":"9783030290290"}],"license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29029-0_12","type":"book-chapter","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T04:04:51Z","timestamp":1565755491000},"page":"132-136","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Application of Perceptual Features for User Authentication in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, L.: On using cognitive models in cryptography. In: IEEE AINA 2016 -The IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 23\u201325 March, pp. 1055\u20131058 (2016)","DOI":"10.1109\/AINA.2016.159"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: IEEE AINA 2017 The 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 27\u201329 March, pp. 1050\u20131054 (2017)","DOI":"10.1109\/AINA.2017.164"},{"key":"12_CR3","unstructured":"Meiappane, A., Premanand, V.: CAPTCHA as Graphical Passwords - A New Security Primitive: Based on Hard AI Problems. Scholars\u2019 Press (2015)"},{"issue":"11","key":"12_CR4","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.1109\/TIFS.2017.2718479","volume":"12","author":"M Osadchy","year":"2017","unstructured":"Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., Perez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inf. Forensics Secur. 12(11), 2640\u20132653 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR5","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-642-35521-9_54","volume-title":"Computer Applications for Bio-technology, Multimedia and Ubiquitous City","author":"MR Ogiela","year":"2012","unstructured":"Ogiela, M.R., Ogiela, U., Ogiela, L.: Secure information sharing using personal biometric characteristics. In: Kim, T.-H., et al. (eds.) Computer Applications for Bio-technology, Multimedia and Ubiquitous City. CCIS, vol. 353, pp. 369\u2013373. Springer, Heidelberg (2012)"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: The Ninth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2015), July 8\u201310, Blumenau, Brazil, pp. 179\u2013183 (2015). \n                    https:\/\/doi.org\/10.1109\/imis.2015.29","DOI":"10.1109\/imis.2015.29"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE AINA 2016 - The IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 23\u201325 March, pp. 1059\u20131063 (2016)","DOI":"10.1109\/AINA.2016.161"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"e4275","DOI":"10.1002\/cpe.4275","volume":"30","author":"U Ogiela","year":"2018","unstructured":"Ogiela, U., Ogiela, L.: Linguistic techniques for cryptographic data sharing algorithms. Concurr. Comput. Pract. E. 30(3), e4275 (2018). \n                    https:\/\/doi.org\/10.1002\/cpe.4275","journal-title":"Concurr. Comput. Pract. E."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/JSYST.2015.2409213","volume":"11","author":"L Ogiela","year":"2017","unstructured":"Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405\u2013414 (2017)","journal-title":"IEEE Syst. J."},{"key":"12_CR10","series-title":"CCIS","first-page":"31","volume-title":"AST 2011","author":"MR Ogiela","year":"2011","unstructured":"Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.-H., et al. (eds.) AST 2011. CCIS, vol. 195, pp. 31\u201335. Springer, Heidelberg (2011)"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Ogiela, L., Ogiela, M.R., Ogiela, U.: Efficiency of strategic data sharing and management protocols. In: The 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), 6\u20138 July, Fukuoka, Japan, pp. 198\u2013201 (2016). \n                    https:\/\/doi.org\/10.1109\/imis.2016.119","DOI":"10.1109\/imis.2016.119"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijinfomgt.2014.11.006","volume":"35","author":"L Ogiela","year":"2015","unstructured":"Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154\u2013159 (2015)","journal-title":"Int. J. Inf. Manag."},{"key":"12_CR13","volume-title":"Modern Cryptography: Applied Mathematics for Encryption and Information Security","author":"Ch Easttom","year":"2015","unstructured":"Easttom, Ch.: Modern Cryptography: Applied Mathematics for Encryption and Information Security. McGraw-Hill Education, New York (2015)"},{"key":"12_CR14","volume-title":"Applied Cryptography","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Applied Cryptography. Wiley, Indianapolis (2015)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Networked-based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29029-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T04:14:11Z","timestamp":1565756051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29029-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"ISBN":["9783030290283","9783030290290"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29029-0_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"assertion":[{"value":"15 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS - 2019","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oita","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}