{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:57:26Z","timestamp":1725843446384},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_41","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T23:57:57Z","timestamp":1450310277000},"page":"283-288","source":"Crossref","is-referenced-by-count":5,"title":["User Authentication Method Design Based on Biometrics in a Multi-cloud Environment"],"prefix":"10.1007","author":[{"given":"Seokhwa","family":"Song","sequence":"first","affiliation":[]},{"given":"JaeSeung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jaesik","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Moon-seog","family":"Jun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Chow, R., et al.: Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM (2010)","DOI":"10.1145\/1866835.1866837"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Lee, S., Ong, I., Lim, H., Lee, H.: Two Factor Authentication for Cloud Computing. International Journal of KIMICS 8(4), August 2010","DOI":"10.6109\/jicce.2010.8.4.427"},{"key":"41_CR3","unstructured":"Graser, T., et al.: Single Sign On. U.S. Patent Application 12\/094,858"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Chang, H., Choi, E.: User authentication in cloud computing. In: Ubiquitous Computing and Multimedia Applications, pp. 338\u2013342. Springer Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-20998-7_42"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Ahn, H., et al.: User authentication platform using provisioning in cloud computing environment. In: Advanced Communication and Networking, pp. 132\u2013138. Springer Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-23312-8_16"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Choudhury, A.J., et al.: A strong user authentication framework for cloud computing. In: 2011 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE (2011)","DOI":"10.1109\/APSCC.2011.14"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Chen, N., Rui, J.: Analysis and improvement of user authentication framework for cloud computing. In: Advanced Materials Research, vol. 756 (2013)","DOI":"10.4028\/www.scientific.net\/AMR.756-759.3482"},{"key":"41_CR8","unstructured":"FIDO: Fast Identity Online Alliance Privacy Principles. The FIDO Alliance : Privacy Principles Whitepaper FIDO Alliance, February 2014"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:17:41Z","timestamp":1559333861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_41","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}