{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:06:29Z","timestamp":1743098789462,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642003059"},{"type":"electronic","value":"9783642003066"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00306-6_16","type":"book-chapter","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T11:15:44Z","timestamp":1234869344000},"page":"211-224","source":"Crossref","is-referenced-by-count":6,"title":["Image-Feature Based Human Identification Protocols on Limited Display Devices"],"prefix":"10.1007","author":[{"given":"Hassan","family":"Jameel","sequence":"first","affiliation":[]},{"given":"Riaz Ahmed","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Le Xuan","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Yuan Wei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Syed Muhammad Khaliq-ur-rehman","family":"Raazi","sequence":"additional","affiliation":[]},{"given":"Ngo Trong","family":"Canh","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yuseung","family":"Son","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11967668_5","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"H. Jameel","year":"2006","unstructured":"Jameel, H., Shaikh, R.A., Lee, H., Lee, S.-Y.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 67\u201384. Springer, Heidelberg (2006)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-46416-6_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T. Matsumoto","year":"1991","unstructured":"Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 409\u2013421. Springer, Heidelberg (1991)"},{"key":"16_CR3","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: 8th USENIX Security Symposium (1999)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-49264-X_31","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"C.H. Wang","year":"1995","unstructured":"Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai\u2019s Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 382\u2013392. Springer, Heidelberg (1995)"},{"key":"16_CR5","first-page":"68","volume-title":"3rd ACM Conference on Computer and Communications Security","author":"T. Matsumoto","year":"1996","unstructured":"Matsumoto, T.: Human-computer cryptography: An attempt. In: 3rd ACM Conference on Computer and Communications Security, pp. 68\u201375. ACM Press, New York (1996)"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1023\/A:1009894418895","volume":"3","author":"X.-Y. Li","year":"1999","unstructured":"Li, X.-Y., Teng, S.-H.: Practical Human-Machine Identification over Insecure Channels. Journal of Combinatorial Optimization\u00a03, 347\u2013361 (1999)","journal-title":"Journal of Combinatorial Optimization"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"16_CR8","unstructured":"Li, S., Shum, H.-Y.: Secure Human-computer Identification against Peeping Attacks (SecHCI): A Survey. Unpublished report, available at Elsevier\u2019s Computer Science Preprint Server (2002)"},{"key":"16_CR9","unstructured":"Dhamija, R., Perrig, A.: Deja Vu: A User Study using Images for Authentication. In: Proc. of the 9th USENIX Security Symposium, pp. 45\u201358 (2000)"},{"key":"16_CR10","unstructured":"Passfaces Corporation: White Paper. The Science behind Passfaces (2005), http:\/\/www.passfaces.com"},{"key":"16_CR11","unstructured":"Sorensen, V.: PassPic - Visual Password Management (2002), http:\/\/www.authord.com"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: IEEE Symposium on Security and Privacy, pp. 295\u2013300 (2006)","DOI":"10.1109\/SP.2006.10"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive, Report 2006\/258, http:\/\/eprint.iacr.org\/","DOI":"10.1109\/SP.2007.13"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BFb0030423","volume-title":"Information Security","author":"M. Bellare","year":"1998","unstructured":"Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 221\u2013231. Springer, Heidelberg (1998)"},{"key":"16_CR15","unstructured":"Jameel, H., Lee, H., Lee, S.: Using Image Attributes for Human Identification Protocols. Technical Report, CoRR abs\/0704.2295 (2007), http:\/\/arxiv.org\/abs\/0704.2295"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00306-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T21:19:46Z","timestamp":1589577586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00306-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642003059","9783642003066"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00306-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}