{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:11:03Z","timestamp":1725898263616},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642340406"},{"type":"electronic","value":"9783642340413"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34041-3_36","type":"book-chapter","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T05:19:34Z","timestamp":1346995174000},"page":"249-253","source":"Crossref","is-referenced-by-count":0,"title":["Research on Fingerprint Identification in Mobile Telephone"],"prefix":"10.1007","author":[{"given":"Fukai","family":"Cao","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Security E-commerce System Combined with Fingerprint Identification and Smart Card. Computer Engineering 29(1), 100\u2013101 (2003)","key":"36_CR1"},{"issue":"6","key":"36_CR2","first-page":"45","volume":"21","author":"J. Clerk Maxwell","year":"2001","unstructured":"Clerk Maxwell, J.: The application of smart card and fingerprint recognition in payment on web. Computer Engineering\u00a021(6), 45\u201347 (2001)","journal-title":"Computer Engineering"},{"doi-asserted-by":"crossref","unstructured":"Benon, P., Barbe, S., Serhrouchni, A.: Publish-subscribe architecture for smart card mobility. IEEE (2003)","key":"36_CR3","DOI":"10.1109\/ICTEL.2003.1191476"},{"key":"36_CR4","doi-asserted-by":"crossref","first-page":"126","DOI":"10.3923\/itj.2012.126.133","volume":"11","author":"Y. Yang","year":"2011","unstructured":"Yang, Y.: Design of a fingerprint recognition based on BF592. Information Technology\u00a011, 126\u2013131 (2011)","journal-title":"Information Technology"},{"issue":"7","key":"36_CR5","first-page":"60","volume":"26","author":"L.-D. Chen","year":"2011","unstructured":"Chen, L.-D.: Design and Implementation of Fingerprint Identification System Based on VC++. Automation & Instrumentation\u00a026(7), 60\u201363 (2011)","journal-title":"Automation & Instrumentation"},{"issue":"5","key":"36_CR6","first-page":"787","volume":"22","author":"G. Cao","year":"2009","unstructured":"Cao, G.: Fast Multi-Stage Hybrid Fingerprint Matching. Pattern Recognition and Artificial Intelligence\u00a022(5), 787\u2013793 (2009)","journal-title":"Pattern Recognition and Artificial Intelligence"},{"issue":"17","key":"36_CR7","first-page":"118","volume":"35","author":"J. Zhang","year":"2011","unstructured":"Zhang, J.: Application and Realization Method of Power Consumption Reduction in Fingerprint Identification System. Video Engineering\u00a035(17), 118\u2013128 (2011)","journal-title":"Video Engineering"},{"issue":"4","key":"36_CR8","first-page":"55","volume":"37","author":"J. Zheng","year":"2011","unstructured":"Zheng, J.: Design and implementation of a fingerprint identification system based on FPGA. Application of Electronic Technique\u00a037(4), 55\u201360 (2011)","journal-title":"Application of Electronic Technique"},{"issue":"6","key":"36_CR9","first-page":"126","volume":"30","author":"Y.-C. Wang","year":"2011","unstructured":"Wang, Y.-C.: Application of fingerprint recognition in identity card net verification system. Transducer and Microsysytem Technologies\u00a030(6), 126\u2013128 (2011)","journal-title":"Transducer and Microsysytem Technologies"},{"issue":"6","key":"36_CR10","first-page":"102","volume":"34","author":"C.-X. Zhang","year":"2011","unstructured":"Zhang, C.-X.: Security Policy of Server Virtualization Based on Fingerprint Identification of Operating System. Modern Electronics Technique\u00a034(6), 102\u2013104 (2011)","journal-title":"Modern Electronics Technique"}],"container-title":["Communications in Computer and Information Science","Information Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34041-3_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T12:20:42Z","timestamp":1643372442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34041-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340406","9783642340413"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34041-3_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}