{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:13:16Z","timestamp":1725563596495},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157165"},{"type":"electronic","value":"9783642157172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15717-2_12","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T09:25:30Z","timestamp":1283333130000},"page":"96-103","source":"Crossref","is-referenced-by-count":0,"title":["Secure Biometric Multi-Logon System Based on Current Authentication Technologies"],"prefix":"10.1007","author":[{"given":"Bobby L.","family":"Tait","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Schneier, B.: Secrets and Lies, digital security in a Networked world, ISBN 0-471-25311-1"},{"key":"12_CR2","unstructured":"von Solms, S.H., Eloff, J.H., Smith, E.: Information Security, p. 8, ISBN 1-919774-39-4"},{"key":"12_CR3","unstructured":"Stein, L.D.: Wen Security, A step-by-step reference guide, pp. 245\u2013275, ISBN 0-201-63489-9"},{"key":"12_CR4","unstructured":"LoptCrack security system, http:\/\/www.l0phtcrack.com\/"},{"key":"12_CR5","unstructured":"http:\/\/www.scan-r.eu\/modules\/pages\/index.php?pagenum=6"},{"key":"12_CR6","unstructured":"The International Biometric Industry Association, http:\/\/www.ibia.org"},{"key":"12_CR7","unstructured":"Miller, B.: Biometric consortium Listserv (August 2, 2002)"},{"key":"12_CR8","unstructured":"http:\/\/www.transcendusa.com\/Products\/ShowImg.asp?ModNo=169&vplay=yes"},{"key":"12_CR9","unstructured":"Get started using Remote Desktop with Windows (July 25, 2006), http:\/\/www.microsoft.com\/windowsxp\/using\/mobility\/getstarted\/remoteintro.mspx"},{"key":"12_CR10","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of Secure Information security, 3rd edn., pp. 382\u2013383, 385, ISBN 978-0-8400-3116-7"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Woodward, J.D., Orleans, N.M., Higgins, P.: Biometrics: Identity assurance in the information age, pp. 31\u201333, ISBN 0-07-222227-1","DOI":"10.2307\/2529300"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Liu, S., Silverman, M.: A Practical Guide to Biometric Security Technology. IT Pro, 27\u201332 (January\/February 2001), IEEE 1520-9202\/01","DOI":"10.1109\/6294.899930"},{"key":"12_CR13","unstructured":"Facebook community site, http:\/\/www.facebook.com"},{"key":"12_CR14","unstructured":"Transend security series USB Flash Drives, http:\/\/www.transcendusa.com\/Products\/ModDetail.asp?ModNo=169&LangNo=0&Func1No=1&Func2No=76"},{"key":"12_CR15","unstructured":"Free Rainbow Tables, http:\/\/www.freerainbowtables.com\/"},{"key":"12_CR16","unstructured":"Banff, A.: A large-scale study of web password habits. In: Proceedings of the 16th international conference on WWWeb, pp. 657\u2013666, ISBN:978-1-59593-654-7"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety, and Sustainability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15717-2_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:12:56Z","timestamp":1606169576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15717-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157165","9783642157172"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15717-2_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}