{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:27:15Z","timestamp":1745468835890,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642349515"},{"type":"electronic","value":"9783642349522"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-34952-2_18","type":"book-chapter","created":{"date-parts":[[2012,12,13]],"date-time":"2012-12-13T06:48:05Z","timestamp":1355381285000},"page":"433-462","source":"Crossref","is-referenced-by-count":1,"title":["Fingerprint and Iris Based Authentication in Inter-cooperative Emerging e-Infrastructures"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Conti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Salvatore","family":"Vitabile","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luca","family":"Agnello","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Filippo","family":"Sorbello","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"11","key":"18_CR1","first-page":"632","volume":"2","author":"S.M. Karume","year":"2011","unstructured":"Karume, S.M., Omieno, K.K.: Synergizing E-infrastructures Initiatives to Foster e-Research in HigherEducation Institutions in Africa. Journal of Emerging Trends in Computing and Information Sciences\u00a02(11), 632\u2013640 (2011) ISSN 2079-8407","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Conti, V., Militello, C., Sorbello, F., Vitabile, S.: A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems. IEEE Transactions on Systems, Man, and Cybernetics (SMC) Part C: Applications & Reviews, 384\u2013395, doi:10.1109\/TSMCC.2010.2045374, ISSN: 1094-6977","DOI":"10.1109\/TSMCC.2010.2045374"},{"key":"18_CR3","unstructured":"Militello, C., Conti, V., Vitabile, S., Sorbello, F.: An Embedded Iris Recognizer for Portable and Mobile Devices. Special Issue on \"Frontiers in Complex, Intelligent and Software Intensive Systems\" of International Journal of Computer Systems Science and Engineering\u00a0 25(2), 33\u201345 (2010)"},{"issue":"2","key":"18_CR4","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1155\/2009\/284124","volume":"5","author":"V. Conti","year":"2009","unstructured":"Conti, V., Militello, C., Vitabile, S., Sorbello, F.: A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems. International Journal on Mobile Information Systems\u00a05(2), 105\u2013124 (2009), doi:10.3233\/MIS-2009-0076, ISSN: 1574-017X","journal-title":"International Journal on Mobile Information Systems"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11596356_6","volume-title":"Embedded and Ubiquitous Computing \u2013 EUC 2005","author":"S. Vitabile","year":"2005","unstructured":"Vitabile, S., Conti, V., Lentini, G., Sorbello, F.: An Intelligent Sensor for Fingerprint Recognition. In: Yang, L.T., Amamiya, M., Liu, Z., Guo, M., Rammig, F.J. (eds.) EUC 2005. LNCS, vol.\u00a03824, pp. 27\u201336. Springer, Heidelberg (2005)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Militello, C., Conti, V., Vitabile, S., Sorbello, F.: Embedded Access Points for Trusted Data and Resources Access in HPC Systems. The Journal of Supercomputing, - Special Issue on High Performance Trusted Computing\u00a055(1), 4\u201327, doi:DOI: 10.1007s11227-009-0379-1, ISSN (Print): 0920-8542, ISSN (Online): 1573-0484","DOI":"10.1007\/s11227-009-0379-1"},{"key":"18_CR7","unstructured":"Ambalakat, P.: Security of Biometric Authentication Systems. 21st Computer Science Seminar. SA1-T1-1. Page 2, http:\/\/www.rh.edu\/~rhb\/cs_seminar_2005\/SessionA1\/ambalakat.pdf"},{"key":"18_CR8","unstructured":"UK Biometrics Working Group(BWG): Biometrics Security Concerns (2003)"},{"issue":"5","key":"18_CR9","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/52.877864","volume":"17","author":"J.R. Michener","year":"2000","unstructured":"Michener, J.R., Acar, T.: Security domains: key management in large-scale systems. Software IEEE\u00a017(5), 52\u201358 (2000), doi:10.1109\/52.877864, ISSN: 0740-7459","journal-title":"Software IEEE"},{"key":"18_CR10","volume-title":"4th Annual PKI R&D Workshop: Multiple Paths to Trust","author":"R. Nielsen","year":"2005","unstructured":"Nielsen, R., Hamilton, B.A.: Observations from the Deployment of a Large Scale PKI. In: 4th Annual PKI R&D Workshop: Multiple Paths to Trust, April 19-21. NIST, Gaithersburg MD (2005)"},{"issue":"4","key":"18_CR11","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A. Jain","year":"1997","unstructured":"Jain, A.: On-Line Fingerprint Verification. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a019(4), 302\u2013314 (1997)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"key":"18_CR12","unstructured":"Flom, L., Safir, A.: Iris Recognition System, United States Patent No. 4,641,349, (issued March 2, 1987) U.S. Government Printing Office, Washington DC (1987)"},{"issue":"11","key":"18_CR13","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J.G. Daugman","year":"1993","unstructured":"Daugman, J.G.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a015(11), 1148\u20131161 (1993)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Field, D.J.: Relations between the statistics of natural images and the response profiles of cortical cells. Journal of the Optical Society of America (1987)","DOI":"10.1364\/JOSAA.4.002379"},{"key":"18_CR15","unstructured":"Masek, L.: Recognition of human Iris patterns for biometric identification. Master\u2019s thesis, Univ. Western Australia, Australia (2003), http:\/\/www.csse.uwa.edu.au\/-pk\/studentprojects\/libor\/ (November 2009)"},{"key":"18_CR16","unstructured":"Thai, R.: Fingerprint Image Enhancement and Minutiae Extraction. PhD Thesis, The University of Western Australia (2003)"},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/BF01211936","volume":"6","author":"B.M. Mehtre","year":"1993","unstructured":"Mehtre, B.M.: Fingerprint image analysis for automatic identification. Machine Vision and Applications\u00a06(2), 124\u2013139 (1993)","journal-title":"Machine Vision and Applications"},{"issue":"3","key":"18_CR18","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/357994.358023","volume":"27","author":"T.Y. Zhang","year":"1984","unstructured":"Zhang, T.Y., Suen, C.Y.: A fast parallel algorithm for thinning digital patterns. Comm. ACM.\u00a027(3), 236\u2013239 (1984)","journal-title":"Comm. ACM."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Conti, V., Militello, C., Vitabile, S., Sorbello, F.: Introducing Pseudo-Singularity Points for Efficient Fingerprints Classification and Recognition. In: 4thInternational Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), February 15-8, pp. 368\u2013375. Andrzej FryczModrzewski Cracow College, Krakow (2010), doi:doi:10.1109\/CISIS.2010.134","DOI":"10.1109\/CISIS.2010.134"},{"issue":"3","key":"18_CR20","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/0031-3203(95)00106-9","volume":"29","author":"K. Karu","year":"1996","unstructured":"Karu, K., Jain, A.K.: Fingerprint classification. Pattern Recognition\u00a029(3), 389\u2013404 (1996)","journal-title":"Pattern Recognition"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Wildes, R.P.: Iris Recognition: An Emerging Biometric Technology. In: Proc. of the IEEE 85(9), 1348\u20131363 (1997)","DOI":"10.1109\/5.628669"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Wildes, R.P., Asmuth, J.C., Green, G.L., Hsu, S.C., Kolczynski, R.J., Matey, J.R., McBride, S.E.: A System for Automated Iris Recognition. In: Proc. of the 2nd IEEE Workshop Applications of Computer Vision, Sarasota, FL, December 5\u20137, pp. 121\u2013128 (1994)","DOI":"10.1109\/ACV.1994.341298"},{"key":"18_CR23","unstructured":"Sanchez-Reillo, R., Sanchez-Avila, C., de Martin-Roche, D.: Iris Recognition for Biometric Identification using Dyadic Wavelet Transform Zero \u2013 Crossing. In: 2001 IEEE 35th International Carnahan Conference on Security Technology, London, October 16-19, pp. 272\u2013277 (2001)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Sanchez-Reillo, R., Sanchez-Avila, C.: Iris Recognition with Low Template Size. In: Proc.of International Conference Audio and Video \u2013 Based Biometric Person Authentication, pp. 324\u2013329 (2001)","DOI":"10.1007\/3-540-45344-X_47"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Sanchez-Reillo, R., Sanchez-Avila, C., de Martin-Roche, D.: Iris \u2013 Based Biometric Recognition using Dyadic Wavelet Transform. IEEE Aerospace and Electronic Systems Magazine, 3\u20136 (October 2002)","DOI":"10.1109\/MAES.2002.1044509"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Canny, J.: A Computational Approach to Edge Detection. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a08, 679\u2013698","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"18_CR27","unstructured":"PohHoonThian, N., Bengio, S., Korczak, J.: A Multi-Sample Multi-Source Model For Biometric Authentication. In: Proc. of IDIAP (April 2002)"},{"key":"18_CR28","unstructured":"Jain, A.K., Hong, L., Kulkarni, Y.: A Multimodal Biometric System Using Fingerprint, Face and Speech. In: Conference on Audio-Video based Biometric Person Authentication (1999)"},{"key":"18_CR29","unstructured":"Bubeck, M.: MultibiometricAutentication. Term Project CS574, San Diego State University (Spring 2003)"},{"key":"18_CR30","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer (2003)"},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1016\/S0167-8655(03)00079-5","volume":"24","author":"A. Ross","year":"2003","unstructured":"Ross, A., Jain, A.: Information fusion in biometrics. Pattern Recognition Letters\u00a024, 2115\u20132125 (2003)","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"18_CR32","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol.\u00a014(1), 21\u201330 (2004), doi:10.1109\/TCSVT.2003.818350","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"18_CR33","unstructured":"FVC (2002), http:\/\/bias.csr.unibo.it\/fvc2002\/databases.asp"},{"key":"18_CR34","unstructured":"BATH, http:\/\/www.bath.ac.uk\/eleceng\/research\/sipg\/irisweb\/"},{"key":"18_CR35","unstructured":"Australian Society of Ophthalmologists, http:\/\/www.aso.asn.au\/"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Castro, M., Jara, A.J., Skarmeta, A.F.: An analysis of M2M platforms: challenges and opportunities for the Internet of Things. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (2012)","DOI":"10.1109\/IMIS.2012.184"},{"key":"18_CR37","unstructured":"Mehrotra, H., Majhi, B., Gupta, P.: Multi-algorithmic Iris authentication system. Presented at the World Acad. Sci., Eng. Technol., Buenos Aires, Argentina\u00a034 (2008) ISSN 2070-3740"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Khalifa, A.B., Amara, N.E.B.: Bimodal biometric verification with different fusion levels. In: Proc. 6th Int. Multi-Conf. Syst., Signals Devices, SSD 2009, pp. 1\u20136 (2009), doi:10.1109\/SSD.2009.4956731.","DOI":"10.1109\/SSD.2009.4956731"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Besbes, F., Trichili, H., Solaiman, B.: Multimodal biometric system based on fingerprint identification and Iris recognition. In: Proc. 3rd Int. IEEE Conf. Inf. Commun. Technol.: From Theory to Applications (ICTTA 2008), pp. 1\u20135 (2008), doi:10.1109\/ICTTA.2008.4530129","DOI":"10.1109\/ICTTA.2008.4530129"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Yang, F., Ma, B.: A new mixed-mode biometrics information fusion based-on fingerprint, hand-geometry and palm-print. In: Proc. 4th Int. IEEE Conf. Image Graph, pp. 689\u2013693 (2007), doi:10.1109\/ICIG.2007.39","DOI":"10.1109\/ICIG.2007.39"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Bonato, L.V., Molz, R.F., Furtado, J.C., Ferro, M.F., Moraes, F.G. Design of a fingerprint system using a hardware\/software environment. In: Proc. of the 2003 ACM\/SIGDA 11th International Symposium on Field Programmable Gate Arrays (2003a) ISBN:1-58113-651-X","DOI":"10.1145\/611817.611860"},{"key":"18_CR42","doi-asserted-by":"crossref","unstructured":"Schaumont, P., Sakiyama, K., Fan, Y., Hwang, D., Yang, S., Hodjat, A., Lai, B., Verbauwhede, I.: Testing ThumbPod: Softcore bugs are hard to find. In: 8th IEEE International High-Level Design Validation and Test Workshop, pp. 77\u201382 (2003) ISBN:0-7803-8236-6","DOI":"10.1109\/HLDVT.2003.1252478"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Miyazawa, K., Ito, K., Aok, T., Kobayashi, K., Katsumata, A.: An Iris Recognition System Using Phase-Based Image Matching. In: IEEE International Conference on Image Processing, pp. 325\u2013328 (2006)","DOI":"10.1109\/ICIP.2006.313159"},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Yoo, J.H., Ko, J.G., Chung, Y.S., Jung, S.U., Kim, K.H., Moon, K.Y., Chung, K.: Design of Embedded Multimodal Biometric Systems. In: 3rd International IEEE Conference on Signal-Image Technologies and Internet-Based System, pp. 1058\u20131062 (2007), doi:10.1109\/SITIS.2007.130","DOI":"10.1109\/SITIS.2007.130"},{"key":"18_CR45","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. From web http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/AESAlgs\/Rijndael\/Rijndael.pdf"}],"container-title":["Studies in Computational Intelligence","Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34952-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T16:20:42Z","timestamp":1745425242000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-34952-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642349515","9783642349522"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34952-2_18","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2013]]}}}