{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:30:32Z","timestamp":1726057832721},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030325909"},{"type":"electronic","value":"9783030325916"}],"license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32591-6_91","type":"book-chapter","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T08:02:57Z","timestamp":1573027377000},"page":"843-850","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Three-Factor Remote User Authentication Scheme Based on Random Projected Biometrics"],"prefix":"10.1007","author":[{"given":"Fujin","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Ruili","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Li","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Youmin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"issue":"8","key":"91_CR1","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390\u20131397 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"91_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1), 28\u201330 (2000)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"12","key":"91_CR3","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"JK Lee","year":"2002","unstructured":"Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12), 554\u2013555 (2002)","journal-title":"Electron. Lett."},{"issue":"1","key":"91_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"CH Lin","year":"2004","unstructured":"Lin, C.H., Lai, Y.Y.: A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 27(1), 19\u201323 (2004)","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"91_CR5","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.chaos.2006.05.061","volume":"35","author":"MK Khan","year":"2008","unstructured":"Khan, M.K., Zhang, J.S., Wang, X.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3), 519\u2013524 (2008)","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"91_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1\u20135 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"91_CR7","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.W., Ma, J., Wang, W.D., Liu, C.L.: Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1), 73\u201379 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"91_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3), 145\u2013151 (2011)","journal-title":"IET Inf. Secur."},{"doi-asserted-by":"crossref","unstructured":"An, Y.: Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. BioMed Res. Int. (2012). Article ID 519723","key":"91_CR9","DOI":"10.1155\/2012\/519723"},{"doi-asserted-by":"crossref","unstructured":"Khan, M.K., Kumari, S.: An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Res. Int. (2013). Article ID 491289","key":"91_CR10","DOI":"10.1155\/2013\/491289"},{"issue":"4","key":"91_CR11","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1007\/s11277-014-2111-6","volume":"80","author":"F Wen","year":"2015","unstructured":"Wen, F., Susilo, W., Yang, G.: Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wirel. Pers. Commun. 80(4), 1747\u20131760 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"91_CR12","first-page":"1","volume":"000","author":"T Limbasiya","year":"2017","unstructured":"Limbasiya, T., Doshi, N.: An analytical study of biometric based remote user authentication schemes using smart cards. Comput. Electr. Eng. 000, 1\u201317 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"91_CR13","first-page":"1","volume":"6","author":"RF Soliman","year":"2018","unstructured":"Soliman, R.F., Amin, M., El-Samie, F.E.A.: A modified cancelable biometrics scheme using random projection. Ann. Data Sci. 6, 1\u201314 (2018)","journal-title":"Ann. Data Sci."},{"doi-asserted-by":"crossref","unstructured":"Larsen, K.G., Nelson, J.: Optimality of the Johnson-Lindenstrauss lemma. In: 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), pp. 633\u2013638 (2017)","key":"91_CR14","DOI":"10.1109\/FOCS.2017.64"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32591-6_91","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T08:03:43Z","timestamp":1573027423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32591-6_91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"ISBN":["9783030325909","9783030325916"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32591-6_91","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"7 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICNC-FSKD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icncfskd2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}