{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:13:31Z","timestamp":1742994811243,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319223889"},{"type":"electronic","value":"9783319223896"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22389-6_8","type":"book-chapter","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T02:59:08Z","timestamp":1439175548000},"page":"103-116","source":"Crossref","is-referenced-by-count":0,"title":["Biometric Identification in eHealthcare: Learning from the Cases of Russia and Italy"],"prefix":"10.1007","author":[{"given":"Polina","family":"Kachurina","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Buccafurri","sequence":"additional","affiliation":[]},{"given":"Lyudmila","family":"Bershadskaya","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Bershadskaya","sequence":"additional","affiliation":[]},{"given":"Dmitrii","family":"Trutnev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10\u201311","key":"8_CR1","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1016\/j.patcog.2011.04.010","volume":"44","author":"G Bailador","year":"2011","unstructured":"Bailador, G., Sanchez-Avila, C., Guerra-Casanova, J., Sierra, A.: Analysis of pattern recognition techniques for in-air signature biometrics. Pattern Recogn. 44(10\u201311), 2468\u20132478 (2011)","journal-title":"Pattern Recogn."},{"issue":"6","key":"8_CR2","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1016\/j.cviu.2011.02.004","volume":"115","author":"A Bastys","year":"2011","unstructured":"Bastys, A., Kranauskas, J., Kr\u00fcger, V.: Iris recognition by fusing different representations of multi-scale Taylor expansion. Comput. Vis. Image Underst. 115(6), 804\u2013816 (2011)","journal-title":"Comput. Vis. Image Underst."},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.cviu.2007.08.005","volume":"110","author":"KW Bowyer","year":"2008","unstructured":"Bowyer, K.W., Hollingsworth, K., Flynn, P.J.: Image understanding for iris biometrics: a survey. Comput. Vis. Image Underst. 110(2), 281\u2013307 (2008)","journal-title":"Comput. Vis. Image Underst."},{"issue":"8","key":"8_CR4","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1016\/j.patrec.2011.08.009","volume":"33","author":"T Tan","year":"2012","unstructured":"Tan, T., Zhang, X., Sun, Z., Zhang, H.: Noisy iris image matching by using multiple cues. Pattern Recogn. Lett. 33(8), 970\u2013977 (2012)","journal-title":"Pattern Recogn. Lett."},{"issue":"4","key":"8_CR5","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.sigpro.2010.09.008","volume":"91","author":"C Chen","year":"2011","unstructured":"Chen, C., Veldhuis, R.: Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier. Sig. Process. 91(4), 906\u2013918 (2011)","journal-title":"Sig. Process."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.inffus.2013.09.001","volume":"18","author":"YJ Chin","year":"2014","unstructured":"Chin, Y.J., Ong, T.S., Teoh, A.B.J., Goh, K.O.M.: Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion. Inf. Fusion 18, 161\u2013174 (2014)","journal-title":"Inf. Fusion"},{"issue":"B","key":"8_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.cose.2013.05.005","volume":"39","author":"H Crawford","year":"2013","unstructured":"Crawford, H., Renaud, K., Storer, T.: A framework for continuous transparent mobile device authentication. Comput. Secur. 39(B), 127\u2013136 (2013)","journal-title":"Comput. Secur."},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M Karnan","year":"2011","unstructured":"Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11(2), 1565\u20131573 (2011)","journal-title":"Appl. Soft Comput."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.ins.2013.09.004","volume":"259","author":"GS Eskander","year":"2014","unstructured":"Eskander, G.S., Sabourin, R., Granger, E.: A bio-cryptographic system based on offline signature images. Inf. Sci. 259, 170\u2013191 (2014)","journal-title":"Inf. Sci."},{"issue":"10","key":"8_CR10","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1016\/j.imavis.2014.01.004","volume":"32","author":"D McDuff","year":"2014","unstructured":"McDuff, D., El Kaliouby, L., Senechal, T., Demirdjian, D., Picard, R.: Automatic measurement of ad preferences from facial responses gathered over the Internet. Image Vis. Comput. 32(10), 630\u2013640 (2014)","journal-title":"Image Vis. Comput."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2013.12.005","volume":"42","author":"C Rathgeb","year":"2014","unstructured":"Rathgeb, C., Busch, C.: Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. Comput. Secur. 42, 1\u201312 (2014)","journal-title":"Comput. Secur."},{"key":"8_CR12","unstructured":"Economic 360 for Egypt: Growth Prospects and Emerging Opportunities in the Healthcare Industry (2011). \n                    https:\/\/frost.com\/prod\/servlet\/report-brochure.pag?id=4721-01-00-00-00"},{"key":"8_CR13","unstructured":"Public Health: Improving health for all EU citizens (2013). \n                    http:\/\/ec.europa.eu\/health\/health_policies\/docs\/improving_health_for_all_eu_citizens_en.pdf"},{"key":"8_CR14","unstructured":"Patient Safety and Quality of Care. Special Euro barometer 411 (2013). \n                    http:\/\/ec.europa.eu\/public_opinion\/archives\/ebs\/ebs_411_en.pdf"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Market Statistics 2012. Biometric Technology Today, 16(6), 12 (2008). doi:\n                    10.1016\/S0969-4765(08)70168-1","DOI":"10.1016\/S0969-4765(08)70168-1"},{"key":"8_CR16","unstructured":"Federal Law of the Russian Federation \u201cOn personal data \u2116152 from 21.07.2014, art.11, p. 2 (2014)"},{"key":"8_CR17","unstructured":"Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Acccuracy and performance of biometric systems. In: Proceedings of MTC 2004 \u2013 Instrumentation and Measurement Technology Conference (2014). \n                    http:\/\/crema.di.unimi.it\/~fscotti\/ita\/pdf\/Scotti14.pdf"},{"key":"8_CR18","unstructured":"Privacy Guarantor General Act about Biometry November, 2014. Published in \u201cGazzetta Ufficiale\u201d n. 280, 2 December 2014"},{"key":"8_CR19","unstructured":"Article 29 Working Party, European Commission, Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 (1995)"},{"key":"8_CR20","unstructured":"Electronic identification and trust services (eIDAS): regulatory environment and beyond. Digital Agenda for Europe. European Commission Directorate General (2015). \n                    http:\/\/ec.europa.eu\/dgs\/connect\/en\/content\/electronic-identification-and-trust-services-eidas-regulatory-environment-and-beyond"},{"issue":"3","key":"8_CR21","first-page":"46","volume":"3","author":"YN Matveev","year":"2012","unstructured":"Matveev, Y.N.: Biometric technologies of person identification by voice and other modalities, Vestnik MGTU. Priborostroenie. Biometric Technol. Special Issue 3(3), 46\u201361 (2012)","journal-title":"Biometric Technol. Special Issue"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-10178-1_14","volume-title":"Electronic Government and the Information Systems Perspective","author":"S Gorelik","year":"2014","unstructured":"Gorelik, S., Lyaper, V., Bershadskaya, L., Buccafurri, F.: Breaking the barriers of e-participation: the experience of russian digital office development. In: K\u020d, A., Francesconi, E. (eds.) EGOVIS 2014. LNCS, vol. 8650, pp. 173\u2013186. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22389-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:25:02Z","timestamp":1559215502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-22389-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319223889","9783319223896"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22389-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}