{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:38:15Z","timestamp":1742971095455,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895978"},{"type":"electronic","value":"9783540895985"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89598-5_16","type":"book-chapter","created":{"date-parts":[[2008,11,22]],"date-time":"2008-11-22T03:40:04Z","timestamp":1227325204000},"page":"231-245","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of a Biometric Authentication Protocol for Signature Creation Application"],"prefix":"10.1007","author":[{"given":"Anongporn","family":"Salaiwarakul","sequence":"first","affiliation":[]},{"given":"Mark D.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Waldmann, U., Scheuermann, D., Eckert, C.: Protected Transmission of Biometric User Authentication Data for Oncard-Matching. In: ACM Symposium on Applied Computing, pp. 425\u2013430 (2004)","key":"16_CR1","DOI":"10.1145\/967900.967990"},{"doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. In: Proceedings of 22nd IEEE Symposium on Foundations of Computer Science, pp. 350\u2013357 (1981)","key":"16_CR2","DOI":"10.1109\/SFCS.1981.32"},{"unstructured":"Gobioff, H., Smith, S., Tygar, J.D., Yee, B.: Smart Cards in Hostile Environments. In: 2nd USENIX Workshop on Electronic Commerce (1996)","key":"16_CR3"},{"unstructured":"Bond, M.: Chip and Pin (EMV) Point-of-Sale Terminal Interceptor. availability = internet (2007), http:\/\/www.cl.cam.ac.uk\/~mkb23\/interceptor\/","key":"16_CR4"},{"unstructured":"Blanchet, B.: ProVerif: Automatic Cryptographic Protocol Verifier User Manual (2005)","key":"16_CR5"},{"doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: POPL 2001 (2001)","key":"16_CR6","DOI":"10.1145\/360204.360213"},{"issue":"3","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1266977.1266978","volume":"10","author":"M. Abadi","year":"2007","unstructured":"Abadi, M., Blanchet, B., Fournet, C.: Just Fast Keying in the Pi Calculus. ACM Transactions on Information and System Security (TISSEC)\u00a010(3), 1\u201359 (2007)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"1-2","key":"16_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2005.02.002","volume":"58","author":"M. Abadi","year":"2005","unstructured":"Abadi, M., Blanchet, B.: Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003\u00a058(1-2), 3\u201327 (2005); Special issue SAS 2003","journal-title":"Science of Computer Programming"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Proceedings of the European Symposium on Programming","author":"S. Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 186\u2013200. Springer, Heidelberg (2005)"},{"key":"16_CR10","volume-title":"19th Computer Security Foundations Workshop","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and Receipt-freeness in Electronic Voting. In: 19th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (2006)"},{"doi-asserted-by":"crossref","unstructured":"Prabhakar, S., Paankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy, 33\u201342 (2003)","key":"16_CR11","DOI":"10.1109\/MSECP.2003.1193209"},{"doi-asserted-by":"crossref","unstructured":"Chen, L., Person, S., Proundler, G., Chen, D., Blanceheff, B.: How can you trust a computing platform? In: Proceedings of Information Security Solutions Europe Conference (ISSE 2000) (2000)","key":"16_CR12","DOI":"10.1016\/S1353-4858(00)12010-0"},{"doi-asserted-by":"crossref","unstructured":"Davida, G.I., Frankel, Y., Matt, B.J.: On Enabling Secure Application Through Off-line Biometric Identification. In: IEEE Symposium on Security and Privacy, vol.\u00a01008, pp. 148\u2013157","key":"16_CR13","DOI":"10.1109\/SECPRI.1998.674831"},{"doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial Gummy Fingers on Fingerprint Systems. In: Proceedings of SPIE. Optical Security and Counterfeit Deterrence Techniques IV, vol.\u00a04677 (2002)","key":"16_CR14","DOI":"10.1117\/12.462719"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89598-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T13:29:50Z","timestamp":1557926990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89598-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895978","9783540895985"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89598-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}