{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:22Z","timestamp":1725541582217},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_26","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"209-216","source":"Crossref","is-referenced-by-count":3,"title":["A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card"],"prefix":"10.1007","author":[{"given":"Sheikh","family":"Ziauddin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.csi.2004.02.004","volume":"27","author":"T. Chen","year":"2004","unstructured":"Chen, T., Lee, W.-B., Horng, G.: Secure SAS-like password authentication schemes. Computer Standards & Interfaces\u00a027(1), 25\u201331 (2004)","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"26_CR2","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H. Chien","year":"2002","unstructured":"Chien, H., Jan, J., Tseng, Y.: An efficient and practical solution to remote authentication: Smart card. Computers and Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computers and Security"},{"issue":"11","key":"26_CR3","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J. Daugman","year":"1993","unstructured":"Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a015(11), 1148\u20131161 (1993)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J. Daugman","year":"2003","unstructured":"Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recognition\u00a036(2), 279\u2013291 (2003)","journal-title":"Pattern Recognition"},{"issue":"9","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers\u00a055(9), 1081\u20131088 (2006)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"26_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M. Hwang","year":"2000","unstructured":"Hwang, M., Li, L.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","volume":"36","author":"M.S. Hwang","year":"2002","unstructured":"Hwang, M.S., Lee, C.C., Tang, Y.L.: A simple remote user authentication scheme. Mathematical and Computer Modelling\u00a036(1), 103\u2013107 (2002)","journal-title":"Mathematical and Computer Modelling"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM CCS 1999: 6th Conference on Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"issue":"1","key":"26_CR9","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"M.K. Khan","year":"2007","unstructured":"Khan, M.K., Zhang, J.: Improving the security of \u2018a flexible biometrics remote user authentication scheme\u2019. Computer Standards & Interfaces\u00a029(1), 82\u201385 (2007)","journal-title":"Computer Standards & Interfaces"},{"issue":"5","key":"26_CR10","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1049\/el:20047658","volume":"41","author":"W.C. Ku","year":"2005","unstructured":"Ku, W.C., Chang, S.T., Chiang, M.H.: Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards. Electronics Letters\u00a041(5), 240\u2013241 (2005)","journal-title":"Electronics Letters"},{"issue":"12","key":"26_CR11","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"J.K. Lee","year":"2002","unstructured":"Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters\u00a038(12), 554\u2013555 (2002)","journal-title":"Electronics Letters"},{"issue":"2","key":"26_CR12","first-page":"565","volume":"50","author":"S.W. Lee","year":"2004","unstructured":"Lee, S.W., Kim, H.S., Yoo, K.Y.: Improved efficient remote user authentication scheme using smart cards. IEEE Transactions on Communications\u00a050(2), 565\u2013567 (2004)","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"C.-H. Lin","year":"2004","unstructured":"Lin, C.-H., Lai, Y.-Y.: A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces\u00a027(1), 19\u201323 (2004)","journal-title":"Computer Standards & Interfaces"},{"key":"26_CR14","volume-title":"Error Control Coding: Fundamentals and Applications","author":"S. Lin","year":"1983","unstructured":"Lin, S., Costello, D.J.: Error Control Coding: Fundamentals and Applications. Prentice-Hall, Englewood Cliffs (1983)"},{"issue":"4","key":"26_CR15","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TPAMI.2007.1002","volume":"29","author":"D.M. Monro","year":"2007","unstructured":"Monro, D.M., Rakshit, S., Zhang, D.: DCT-based iris recognition. IEEE Trans. Pattern Anal. Mach. Intell.\u00a029(4), 586\u2013595 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"26_CR16","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"J.J. Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security\u00a022(7), 591\u2013595 (2003)","journal-title":"Computers & Security"},{"issue":"4","key":"26_CR17","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H. Sun","year":"2000","unstructured":"Sun, H.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"26_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01246633","volume":"9","author":"R. Wildes","year":"1996","unstructured":"Wildes, R., Asmuth, J.C., Green, G.L., Hsu, S.C., Kolczynski, R.J., Matey, J.R., McBride, S.E.: A machine-vision system for iris recognition. Machine Vision and Applications\u00a09(1), 1\u20138 (1996)","journal-title":"Machine Vision and Applications"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Yang, S., Verbauwhede, I.: Secure iris verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, pp. II\u2013133\u2013II\u2013136 (2007)","DOI":"10.1109\/ICASSP.2007.366190"},{"issue":"8","key":"26_CR20","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W.H. Yang","year":"1999","unstructured":"Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Computers & Security\u00a018(8), 727\u2013733 (1999)","journal-title":"Computers & Security"},{"issue":"1","key":"26_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.cose.2004.06.004","volume":"24","author":"E.J. Yoon","year":"2005","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: An improvement of Hwang-Lee-Tang\u2019s simple remote user authentication schemes. Computers & Security\u00a024(1), 50\u201356 (2005)","journal-title":"Computers & Security"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:38:52Z","timestamp":1558388332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}