{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:35Z","timestamp":1725560915222},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_27","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"355-364","source":"Crossref","is-referenced-by-count":2,"title":["Fingerprint-Based Authentication for USB Token Systems"],"prefix":"10.1007","author":[{"given":"Daesung","family":"Moon","sequence":"first","affiliation":[]},{"given":"Youn Hee","family":"Gil","sequence":"additional","affiliation":[]},{"given":"Dosung","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Sung Bum","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yongwha","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Chee Hang","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/b117227","volume-title":"Biometrics: Personal Identification in Networked Society","author":"A. Jain","year":"1999","unstructured":"Jain, A., Bole, R., Panakanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"27_CR2","volume-title":"Intelligent Biometric Techniques in Fingerprint and Face Recognition","author":"L. Jain","year":"1999","unstructured":"Jain, L., et al.: Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press, Boca Raton (1999)"},{"issue":"5","key":"27_CR3","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1364\/AO.31.000652","volume":"31","author":"F. Gamble","year":"1992","unstructured":"Gamble, F., Frye, L., Grieser, D.: Real-time Fingerprint Verification System. Applied Optics\u00a031(5), 652\u2013655 (1992)","journal-title":"Applied Optics"},{"issue":"4","key":"27_CR4","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A. Jain","year":"1997","unstructured":"Jain, A., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a019(4), 302\u2013313 (1997)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Ratha, N., Karu, K., Jain, A.: A Real-Time Matching System for Large Fingerprint Databases. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a018(8) (August 1996)","DOI":"10.1109\/34.531800"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Lim, S., Lee, K.: Efficient Iris Recognition through Improvement of Feature Vector and Classifier. ETRI Journal\u00a023(2) (2001)","DOI":"10.4218\/etrij.01.0101.0203"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Im, S., et al.: A Direction Based Vascular Pattern Extraction Algorithm for Hand Vascular Pattern Verification. ETRI Journal\u00a025(2) (2003)","DOI":"10.4218\/etrij.03.0102.0211"},{"key":"27_CR8","unstructured":"Kingpin: Attacks on and Countermeasures for USB Hardware Token Devices. In: Proceedings of the Fifth Nordic Workshop on Secure IT Systems Encouraging Co-operation, Reykjavik, Iceland, pp. 35\u201357, October 12-13 (2000)"},{"key":"27_CR9","unstructured":"Janke, M.: FingerCard Project Presentation (2001), http:\/\/www.finger-card.org"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Gil, Y., et al.: Performance Analysis of Smart Card-based Fingerprint Recognition for Secure User Authentication. In: Proc. of IFIP on E-commerce, E-business, E-government, pp. 87\u201396 (2001)","DOI":"10.1007\/0-306-47009-8_7"},{"key":"27_CR11","unstructured":"Intel, http:\/\/www.intel.com"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Pan, S., et al.: A Memory-Efficient Fingerprint Verification Algorithm using A Multi-Resolution Accumulator Array. ETRI Journal\u00a025(3) (June 2003)","DOI":"10.4218\/etrij.03.0102.3316"},{"key":"27_CR13","unstructured":"SecuGen, http:\/\/www.secugen.com"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:41:11Z","timestamp":1559331671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}