{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:21:30Z","timestamp":1725578490292},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_6","type":"book-chapter","created":{"date-parts":[[2011,3,6]],"date-time":"2011-03-06T20:58:50Z","timestamp":1299445130000},"page":"65-77","source":"Crossref","is-referenced-by-count":0,"title":["Towards More Secure Biometric Readers for Effective Digital Forensic Investigation"],"prefix":"10.1007","author":[{"given":"Zouheir","family":"Trabelsi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed","family":"Al-Hemairy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saad","family":"Amin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","volume-title":"Biometric Technologies and Verification Systems","author":"J. Vacca","year":"2007","unstructured":"Vacca, J.: Biometric Technologies and Verification Systems. Butterworth-Heinemann Publisher, Butterworths (2007) ISBN-10: 0750679670"},{"key":"6_CR2","volume-title":"Biometric Systems: Technology Design and Performance Evaluation","author":"J. Wayman","year":"2004","unstructured":"Wayman, J., Jain, A., Maltoni, D., Maio, D.: Biometric Systems: Technology Design and Performance Evaluation. Springer Publisher, Heidelberg (2004) ISBN-10: 1852335963"},{"key":"6_CR3","volume-title":"Implementing Biometric Security","author":"J. Chirillo","year":"2003","unstructured":"Chirillo, J., Blaul, S.: Implementing Biometric Security. Wiley Publisher, Chichester (2003) ISBN-10: 0764525026"},{"key":"6_CR4","unstructured":"Panasonic Iris reader BM-ET330, Specification Sheet, \n                  \n                    ftp:\/\/ftp.panasonic.com\/pub\/Panasonic\/cctv\/SpecSheets\/BM-ET330.pdf"},{"key":"6_CR5","unstructured":"Nitgen Fingerprint reader NAC 3000, Specification Sheet, \n                  \n                    http:\/\/www.nitgen.com"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-30548-4_4","volume-title":"Advances in Biometric Person Authentication","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: Recognising Persons by Their Iris Patterns. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol.\u00a03338, pp. 5\u201325. Springer, Heidelberg (2004)"},{"key":"6_CR7","unstructured":"The MIT Technology Review in the Emerging Technologies That Will Change the World, Ten emerging technologies that will change the world (January\/February 2001), \n                  \n                    http:\/\/www.techreview.com"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Duagman","year":"2004","unstructured":"Duagman, J.: How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology\u00a014, 21\u201330 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"6_CR9","unstructured":"Tony, M.: Biometric authentication in the real world, Centre for Mathematics and Scientific Computing, National Physical Laboratory, UK (Online) (2001), \n                  \n                    http:\/\/www.npl.co.uk\/upload\/pdf\/biometrics_psrevho.pdf"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.tele.2006.06.005","volume":"25","author":"A. Al-Raisi","year":"2008","unstructured":"Al-Raisi, A., Al-Khouri, A.: Iris Recognition and the Challenge of Homeland and Border Control Security in UAE. Journal of Telematics and Informatics\u00a025, 117\u2013132 (2008)","journal-title":"Journal of Telematics and Informatics"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Trabelsi, Z., Shuaib, K.: A Novel Man-in-the-Middle Intrusion Detection Scheme for Switched LANs. The International Journal of Computers and Applications 3(3) (2008)","DOI":"10.2316\/Journal.202.2008.3.202-2195"},{"key":"6_CR12","unstructured":"FrameIP Packet Generator, \n                  \n                    http:\/\/www.FrameIP.com"},{"key":"6_CR13","unstructured":"SYN flood, \n                  \n                    http:\/\/www.FrameIP.com"},{"key":"6_CR14","unstructured":"Al-Hemairy, M., Trabelsi, Z., Amin, S.: Sniffing Attacks Prevention\/Detection Techniques in LAN networks & the effect on Biometric Technology. A thesis submitted to The British University in Dubai, School of Informatics (May 2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T06:20:08Z","timestamp":1558419608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}