{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:35:33Z","timestamp":1743104133624,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_82","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"953-964","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Iris-Based Authentication for Smart Devices in the Cloud"],"prefix":"10.1007","author":[{"given":"Mustafa A.","family":"Al Sibahee","sequence":"first","affiliation":[]},{"given":"Songfeng","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Enas Wahab","family":"Abood","sequence":"additional","affiliation":[]},{"given":"Ahmed Abdulelah Jasim","family":"Al-Ashoor","sequence":"additional","affiliation":[]},{"given":"Samet","family":"Yilmaz","sequence":"additional","affiliation":[]},{"given":"Erasmus","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"82_CR1","doi-asserted-by":"publisher","unstructured":"Abduljabbar ZA, Jin H, Ibrahim A, Hussien ZA, Hussain MA, Abbdal SH, Zou D (2016) Privacy-preserving image retrieval in IoT-cloud. In: Proceedings of IEEE Trustcom BigData SEISPA. IEEE Press, Hong Kong, pp 799-806. https:\/\/doi.org\/10.1109\/TrustCom.2016.0141","DOI":"10.1109\/TrustCom.2016.0141"},{"key":"82_CR2","doi-asserted-by":"publisher","unstructured":"Blaine A, Mahesh B, Daqing H, Stephanie S (2020) Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans Biom Behav Identity Sci 2:377\u2013387. https:\/\/doi.org\/10.1109\/TBIOM.2020.3003988","DOI":"10.1109\/TBIOM.2020.3003988"},{"key":"82_CR3","doi-asserted-by":"publisher","unstructured":"Abduljabbar ZA, Ibrahim A, Hussain MA, Abbdal H, Mustafa ZA, Al Sibahee A, Songfeng L (2019) EEIRI: efficient encrypted image retrieval in IoT-cloud. KSII Trans Internet Inf Syst 13:5692\u20135716. https:\/\/doi.org\/10.3837\/tiis.2019.11.023","DOI":"10.3837\/tiis.2019.11.023"},{"key":"82_CR4","doi-asserted-by":"publisher","unstructured":"Jin X, Dayin W, Dongdai L, Wenling W (2006) An efficient one-key Carter-Wegman message authentication code. In: Proceedings of the international conference on computational intelligence and security. IEEE Press, Guangzhou, China, pp 1331\u20131334. https:\/\/doi.org\/10.1109\/ICCIAS.2006.295275","DOI":"10.1109\/ICCIAS.2006.295275"},{"key":"82_CR5","doi-asserted-by":"publisher","unstructured":"Zi-ming Z, Yan-fei L, Hui L, Yi-xian Y (2008) An efficient user-to-user authentication scheme in peer-to-peer system. In: Proceedings of the first international conference on intelligent networks and intelligent systems ICINIS. IEEE Press, Wuhan, China, pp 263\u2013266. https:\/\/doi.org\/10.1109\/ICINIS.2008.142","DOI":"10.1109\/ICINIS.2008.142"},{"key":"82_CR6","doi-asserted-by":"publisher","unstructured":"Zhenxing L, Lallie HS, Lu L, Yongzhao Z, Kaigui W (2011) A hash-based secure interface on plain connection. In: Proceedings of the sixth international ICST conference on communications and networking in China CHINACOM. IEEE Press, Harbin, China, pp 1236\u20131239. https:\/\/doi.org\/10.1109\/ChinaCom.2011.6158347","DOI":"10.1109\/ChinaCom.2011.6158347"},{"key":"82_CR7","doi-asserted-by":"publisher","unstructured":"Al-Assam H, Rashid R, Jassim S (2013) Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In: Proceedings of the 8th international conference for internet technology and secured transactions ICITST. IEEE Press, London, UK, pp 369\u2013374. https:\/\/doi.org\/10.1109\/ICITST.2013.6750224","DOI":"10.1109\/ICITST.2013.6750224"},{"key":"82_CR8","doi-asserted-by":"publisher","unstructured":"Castiglione A, De S, Castiglione A, Palmieri F (2014) An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update. In: Proceedings of the 28th international conference on advanced information networking and applications AINA. IEEE Press, Victoria, Canada, pp 351\u2013358. https:\/\/doi.org\/10.1109\/AINA.2014.45","DOI":"10.1109\/AINA.2014.45"},{"key":"82_CR9","doi-asserted-by":"publisher","unstructured":"Abduljabbar ZA, Mohammed RJ (2018) Towards one-time biometric-message authentication code in cloud computing. J Eng Appl Sci JEAS 13:8027\u20138033. https:\/\/doi.org\/10.3923\/jeasci.2018.8027.8033","DOI":"10.3923\/jeasci.2018.8027.8033"},{"key":"82_CR10","doi-asserted-by":"publisher","unstructured":"Nashwan JH (2020) Robust iris recognition framework using computer vision algorithms. In: 4th international conference on smart grid and smart cities ICSGSC. IEEE, Osaka, Japan, pp 18\u201321. https:\/\/doi.org\/10.1109\/ICSGSC50906.2020.9248564","DOI":"10.1109\/ICSGSC50906.2020.9248564"},{"key":"82_CR11","doi-asserted-by":"publisher","unstructured":"Daugman J (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14:21\u201330. https:\/\/doi.org\/10.1109\/TCSVT.2003.818350","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"82_CR12","doi-asserted-by":"publisher","unstructured":"Hariprasath S, Mohan V (2008) Biometric personal identification based on iris recognition using complex wavelet transformations. In: Proceedings of the international conference on computing, communication and networking ICCCN. Thomas, VI, USA, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICCCNET.2008.4787736","DOI":"10.1109\/ICCCNET.2008.4787736"},{"key":"82_CR13","unstructured":"Stallings W (2014) Cryptography and network security: principles and practice. In: Cryptography and network security: principles and practice, 6th edn. New York, NY, USA, pp 1\u2013760"},{"key":"82_CR14","doi-asserted-by":"publisher","unstructured":"Nadiya PV, Imran BM (2013) Image steganography in DWT domain using double-stegging with RSA encryption. In: International conference on signal, image processing and pattern recognition. ACM, New York, NY, USA, pp 283\u2013287. https:\/\/doi.org\/10.1109\/ICSIPR.2013.6497941","DOI":"10.1109\/ICSIPR.2013.6497941"},{"key":"82_CR15","unstructured":"International Telecommunication Union (2014) M2M service layer: APIs and protocols overview. Focus group technical report of ITU-T focus group on M2M service layer, telecommunication standardization sector of ITU, FG M2M, D3.1 Version 1.0"},{"key":"82_CR16","doi-asserted-by":"crossref","unstructured":"Park J, Kang N (2013) Designing a secure service manager for internet of things. Adv Sci Technol Lett 43:162\u2013165; Multimedia","DOI":"10.14257\/astl.2013.43.35"},{"key":"82_CR17","doi-asserted-by":"publisher","unstructured":"Shen H, Shen J, Khan MK, Lee J-H (2017) Efficient RFID authentication using elliptic curve cryptography for the internet of things. In: Wireless personal communications, vol 96. Springer, pp 5253\u20135266. https:\/\/doi.org\/10.1007\/s11277-016-3739-1","DOI":"10.1007\/s11277-016-3739-1"},{"key":"82_CR18","doi-asserted-by":"publisher","unstructured":"Alizai ZA, Tareen NF, Jadoon I (2018) Improved IoT device authentication scheme using device capability and digital signatures. In: International conference on applied and engineering mathematics (ICAEM). IEEE Xplore, London, U.K., pp 115\u2013119. https:\/\/doi.org\/10.1109\/ICAEM.2018.8536261","DOI":"10.1109\/ICAEM.2018.8536261"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_82","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T17:06:18Z","timestamp":1644339978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_82"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_82","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}