{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:49:11Z","timestamp":1753886951799,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031302572"},{"type":"electronic","value":"9783031302589"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30258-9_10","type":"book-chapter","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T07:09:12Z","timestamp":1681888152000},"page":"105-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Method Authentication of Objects Information Communication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2290-5786","authenticated-orcid":false,"given":"Rakhimberdiev","family":"Kuvonchbek","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,20]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Edna Elizabeth, N., Nivetha, S.: Design of a two-factor authentication ticketing system for transit applications. In: IEEE Region 10 Conference (TENCON), pp. 2496\u20132502. Singapore (2016)","DOI":"10.1109\/TENCON.2016.7848483"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.future.2019.05.025","volume":"101","author":"FS Babamir","year":"2019","unstructured":"Babamir, F.S., Kirci, M.: Dynamic digest based authentication for client\u2013server systems using biometric verification. Future Gener. Comput. Syst. 101, 112\u2013126 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1016\/j.procs.2018.04.323","volume":"131","author":"Y Yu","year":"2018","unstructured":"Yu, Y., He, J., Zhu, N., Cai, F., Pathan, M.S.: A new method for identity authentication using mobile terminals. Procedia Comput. Sci. 131, 771\u2013778 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"10_CR4","unstructured":"\u0418cxa\u043ao\u0432, A.\u042e., Me\u0449ep\u044f\u043ao\u0432, P.B., \u0428e\u043by\u043fa\u043do\u0432, A.A., \u0418cxa\u043ao\u0432, C.\u042e.: Co\u0432pe\u043ce\u043d\u043d\u044be \u043ce\u0442o\u0434\u044b \u0438 c\u043foco\u0431\u044b \u0438\u0434e\u043d\u0442\u0438\u0444\u0438\u043aa\u0446\u0438\u0438. Teop\u0438\u044f \u0438 \u043fpa\u043a\u0442\u0438\u043aa. \u2013 To\u043cc\u043a: T\u0413\u0423C\u0423P 114 (2016)"},{"key":"10_CR5","first-page":"97","volume":"3","author":"A\u042e \u0418cxa\u043ao\u0432","year":"2014","unstructured":"\u0418cxa\u043ao\u0432, A.\u042e: C\u0438c\u0442e\u043ca \u0434\u0432yx\u0444a\u043a\u0442op\u043do\u0439 ay\u0442e\u043d\u0442\u0438\u0444\u0438\u043aa\u0446\u0438\u0438 \u043da oc\u043do\u0432e QR \u043ao\u0434o\u0432. \u0411e\u0437o\u043fac\u043doc\u0442\u044c \u0438\u043d\u0444op\u043ca\u0446\u0438o\u043d\u043d\u044bx \u0442ex\u043do\u043bo\u0433\u0438\u0439 3, 97\u2013101 (2014)","journal-title":"\u0411e\u0437o\u043fac\u043doc\u0442\u044c \u0438\u043d\u0444op\u043ca\u0446\u0438o\u043d\u043d\u044bx \u0442ex\u043do\u043bo\u0433\u0438\u0439"},{"issue":"32","key":"10_CR6","first-page":"52","volume":"1","author":"SP Evseev","year":"2015","unstructured":"Evseev, S.P., Tomashevskyy, B.P.: Two-factor authentication methods threats analysis. Radio Electron. Comput. Sci. Control 1(32), 52\u201359 (2015)","journal-title":"Radio Electron. Comput. Sci. Control"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Juraev, G., Rakhimberdiev, K.: Mathematical modeling of credit scoring system based on the Monge-Kantorovich problem. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/IEMTRONICS55184.2022.9795800"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Umarovich, J.G., Bakhtiyorovich, R.K.: Modeling the decision-making process of lenders based on blockchain technology. In: 2021 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ICISCT52966.2021.9670211"},{"key":"10_CR9","unstructured":"Juraev, G., Rakhimberdiev, K.: Prospects of application of blockchain technology in the banking. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1\u20135 (2022)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Karimov, M., Arzieva, J., Rakhimberdiev, K.: Development of approaches and schemes for proactive information protection in computer networks. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1\u20135 (2022)","DOI":"10.1109\/ICISCT55600.2022.10146828"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Tashev, K., Arzieva, J., Arziev, A., Rakhimberdiev, K.: Method authentication of objects information communication systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1\u20135 (2022)","DOI":"10.1109\/ICISCT55600.2022.10146923"},{"key":"10_CR12","unstructured":"Arzieva, J., Arziev, A., Rakhimberdiev, K.: Application of random number generators in solving the problem of user authentication in blockchain systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1\u20135 (2022)"},{"key":"10_CR13","unstructured":"Sulak, F.: Cryptographic random testing of block ciphers and hash functions. Publication of the Middle East Technical University Ph.D. Examinations, pp. 7\u201339 (2011)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30258-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T19:07:53Z","timestamp":1729278473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30258-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031302572","9783031302589"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30258-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tashkent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Uzbekistan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"282","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}