{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:24:33Z","timestamp":1725567873343},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221463"},{"type":"electronic","value":"9783540259480"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25948-0_75","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T17:03:58Z","timestamp":1287939838000},"page":"547-554","source":"Crossref","is-referenced-by-count":5,"title":["Biometric User Authentication on Smart Cards by Means of Handwritten Signatures"],"prefix":"10.1007","author":[{"given":"Olaf","family":"Henniger","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Franke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"75_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0031-3203(89)90059-9","volume":"22","author":"R. Plamondon","year":"1989","unstructured":"Plamondon, R., Lorette, G.: Automatic signature verification and writer identification \u2013 The state of the art. Pattern Recognition\u00a022, 107\u2013131 (1989)","journal-title":"Pattern Recognition"},{"key":"75_CR2","unstructured":"Schmidt, C.: On-line Unterschriftenanalyse zur Benutzerverifikation. RWTH Aachen, Germany, PhD Thesis (1998) (in German)"},{"key":"75_CR3","unstructured":"Java Card 2.1.1 Virtual Machine Specification. Sun Microsystems, Revision 1.0 (May 2000)"},{"key":"75_CR4","unstructured":"Reference manual of the Java card operating system Sm@rtCaf\u00e9 2.0. Giesecke & Devrient, edition 12\/01 (2001)"},{"key":"75_CR5","unstructured":"Atmel 8-bit AVR microcontroller with 8 Kbytes in-system programmable flash \u2013 AT90S8515. Datasheet (2001)"},{"key":"75_CR6","unstructured":"Information technology \u2013 Identification cards \u2013 Integrated circuit(s) cards with contacts \u2013 Part 6: Interindustry data elements. International Standard ISO\/IEC 7816-6"},{"key":"75_CR7","unstructured":"Information technology \u2013 Identification cards \u2013 Integrated circuit(s) cards with contacts \u2013 Part 11: Personal verification through biometric methods. International Standard ISO\/IEC 7816-11"},{"key":"75_CR8","unstructured":"Information technology \u2013 ASN.1 encoding rules \u2013 Part 1: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). International Standard ISO\/IEC 8825-1"},{"key":"75_CR9","unstructured":"Information technology \u2013 Identification cards \u2013 Integrated circuit(s) cards with contacts \u2013 Part 4: Interindustry commands for interchange. International Standard ISO\/IEC 7816- 4"},{"key":"75_CR10","first-page":"1","volume-title":"Time Warps, String Edits, and Macromolecules: The Theory and Practice of Sequence Comparison","author":"J.B. Kruskal","year":"1983","unstructured":"Kruskal, J.B.: An overview of sequence comparison. In: Sankoff, D., Kruskal, J.B. (eds.) Time Warps, String Edits, and Macromolecules: The Theory and Practice of Sequence Comparison, pp. 1\u201344. Addison-Wesley, Reading (1983)"},{"key":"75_CR11","unstructured":"Wirtz, B.: Segmentorientierte Analyse und nichtlineare Auswertung f\u00fcr die dynamische Unterschriftsverifikation. TU Munich, Germany, PhD Thesis (1998) (in German)"},{"key":"75_CR12","first-page":"623","volume":"26","author":"H. Sakoe","year":"1980","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming optimization for spoken word recognition. IEEE Trans. Acoustics, Speech and Signal Processing\u00a026, 623\u2013625 (1980)","journal-title":"IEEE Trans. Acoustics, Speech and Signal Processing"},{"key":"75_CR13","unstructured":"Mansfield, A.T., Wayman, J.L.: Best practices in testing and reporting performance of biometric devices. Version 2.0 (August 2002)"}],"container-title":["Lecture Notes in Computer Science","Biometric Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25948-0_75.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:19Z","timestamp":1620011899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25948-0_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221463","9783540259480"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25948-0_75","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}