{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:50Z","timestamp":1725562790032},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_26","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"343-349","source":"Crossref","is-referenced-by-count":1,"title":["Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach"],"prefix":"10.1007","author":[{"given":"Ramaswamy","family":"Chandramouli","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Securing e-business applications using Smart Cards. IBM Systems Journal\u00a040(3) (2001), http:\/\/www.research.ibm.com\/journal\/sj\/403\/hamann.html","DOI":"10.1147\/sj.403.0635"},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/TCE.2004.1309433","volume":"50","author":"M. Kumar","year":"2004","unstructured":"Kumar, M.: New Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics\u00a050(2), 597\u2013600 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"26_CR3","unstructured":"FIPS 201 - Personal Identity Verification of Federal Employees and Contractors, http:\/\/csrc.nist.gov\/publications\/fips\/fips201-1\/FIPS-201-1-chng1.pdf"},{"key":"26_CR4","unstructured":"TWIC Reader Hardware And Card Application Specification, May 30 (2008), http:\/\/www.tsa.gov\/assets\/pdf\/twic_reader_card_app_spec.pdf"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:42:35Z","timestamp":1606167755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}