{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:09:46Z","timestamp":1725905386281},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633114"},{"type":"electronic","value":"9783319633121"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63312-1_73","type":"book-chapter","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T15:43:13Z","timestamp":1500478993000},"page":"811-822","source":"Crossref","is-referenced-by-count":0,"title":["Identity Authentication Technology of Mobile Terminal Based on Cloud Face Recognition"],"prefix":"10.1007","author":[{"given":"Likai","family":"Dong","sequence":"first","affiliation":[]},{"given":"Zhikang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"issue":"6","key":"73_CR1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"73_CR2","doi-asserted-by":"crossref","unstructured":"Suo, H., Liu, Z., Wan, J., et al.: Security and privacy in mobile cloud computing. In: Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, pp. 655\u2013659. IEEE (2013)","DOI":"10.1109\/IWCMC.2013.6583635"},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Darwish, A.A., et al.: Human authentication using face and fingerprint biometrics. In: 2010 Second International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 274\u2013278. IEEE (2010)","DOI":"10.1109\/CICSyN.2010.40"},{"issue":"6","key":"73_CR4","first-page":"41","volume":"21","author":"M Soltane","year":"2010","unstructured":"Soltane, M., Doghmane, N., Guersi, N.: Face and speech based multi-modal biometric authentication. Int. J. Adv. Sci. Technol. 21(6), 41\u201356 (2010)","journal-title":"Int. J. Adv. Sci. Technol."},{"issue":"5","key":"73_CR5","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCC.2010.2051328","volume":"41","author":"H Zhou","year":"2011","unstructured":"Zhou, H., Sadka, A.H.: Combining perceptual features with diffusion distance for face recognition. IEEE Trans. Syst. Man Cybern. Part C 41(5), 577\u2013588 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"issue":"10","key":"73_CR6","doi-asserted-by":"crossref","first-page":"3251","DOI":"10.1016\/j.patcog.2008.04.008","volume":"41","author":"H Zhou","year":"2008","unstructured":"Zhou, H., Yuan, Y., Sadka, A.H.: Application of semantic features in face recognition. Pattern Recogn. 41(10), 3251\u20133256 (2008)","journal-title":"Pattern Recogn."},{"key":"73_CR7","unstructured":"Kremic, E., Subasi, A., Hajdarevic, K.: Face recognition implementation for client server mobile application using PCA. In: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI), pp. 435\u2013440. IEEE (2012)"},{"key":"73_CR8","unstructured":"Kremic, E., Subasi, A.: The implementation of face security for authentication implemented on mobile phone (2011)"},{"key":"73_CR9","unstructured":"Pawle, A.A., Pawar, V.P.: Face recognition system (FRS) on cloud computing for user authentication. Int. J. Soft Comput. Eng. (IJSCE) 3(4) (2013)"},{"key":"73_CR10","doi-asserted-by":"crossref","unstructured":"Celesti, A., Tusa, F., Villari, M., et al.: Security and cloud computing: intercloud identity management infrastructure. In: 2010 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), pp. 263\u2013265. IEEE (2010)","DOI":"10.1109\/WETICE.2010.49"},{"key":"73_CR11","unstructured":"Tencent AI Lab. \nhttp:\/\/ai.tencent.com\/ailab\/"},{"key":"73_CR12","unstructured":"Face++. \nhttps:\/\/www.faceplusplus.com.cn\/face-detection\/"},{"key":"73_CR13","unstructured":"EyeKey. \nhttp:\/\/www.eyekey.com\/"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63312-1_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T16:05:11Z","timestamp":1500480311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63312-1_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633114","9783319633121"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63312-1_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}