{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T14:44:00Z","timestamp":1648824240497},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,4,1]],"date-time":"2006-04-01T00:00:00Z","timestamp":1143849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2006,4]]},"DOI":"10.1007\/bf03219915","type":"journal-article","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T12:15:24Z","timestamp":1342786524000},"page":"418-442","source":"Crossref","is-referenced-by-count":0,"title":["Strong and privacy-friendly management of federated identities for service provision over UMTS"],"prefix":"10.1007","volume":"61","author":[{"given":"Christas K.","family":"Dimitriadis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Despina","family":"Polemi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"BF03219915_CR1","unstructured":"Bernard (R.), Managing Identity Management,Security Technology and Design,6\/2005, SecuritylnfoWatch, 2005."},{"key":"BF03219915_CR2","doi-asserted-by":"crossref","unstructured":"Damiani (E.),De Capitani Di Vimercati (S.),Samarati (P.), Managing Multiple and Dependable Identities.Ieee Internet Computing,7, No. 6, 2003.","DOI":"10.1109\/MIC.2003.1250581"},{"key":"BF03219915_CR3","unstructured":"Mont (M.),Pearson (S.),Bramhall (P.), Towards Accountable Management of Identity and Privacy, Proceedings of 14th international workshop on database and expert systems applications, 2003."},{"key":"BF03219915_CR4","doi-asserted-by":"crossref","unstructured":"Wisely (D.),Eardley (P.),Burness (L.),Ip for 3G \u2014 Networking Technologies for Mobile Communications,John Wiley & Sons, 2002.","DOI":"10.1002\/0470847794"},{"key":"BF03219915_CR5","doi-asserted-by":"crossref","unstructured":"Mitchell (C. J.), Security for Mobility,Iee Telecommunication Series,51, 2004.","DOI":"10.1049\/PBTE051E"},{"key":"BF03219915_CR6","unstructured":"Identity management for micropayments in a mobile environment.Siemens Paycircle, 2003."},{"key":"BF03219915_CR7","unstructured":"TS 31.101 \u2014Uicc terminal interface; physical and logical characteristics,3rd Generation Partnership Project, 2005."},{"key":"BF03219915_CR8","unstructured":"Beno\u00eet (O.),Dabbous (N.),Gauteron (L.),Girard (P.),Handschuh (H.),Naccache (D.),Socile (S.),Whelan (C), Mobile Terminal Security,Cryptology ePrint Archive,158, 2004."},{"key":"BF03219915_CR9","unstructured":"Biometric vocabulary corpus,Iso\/iec jtc1,Sc37\/Sg1, 2004."},{"key":"BF03219915_CR10","first-page":"41","volume":"4","author":"(C) Dimitriadis","year":"2004","unstructured":"Dimitriadis (C), Polemi (D.), Biometrics \u2014 Risks and Controls,Information Systems Control Journal,4, pp 41\u201343, 2004.","journal-title":"Information Systems Control Journal"},{"key":"BF03219915_CR11","unstructured":"Ist-1999-20078 Business environment of biometrics involved in e-commerce \u2014Bee: Deliverable D7.1 Conclusions and Recommendations, http:\/\/expertnet.net.gr\/bee,Bee Consortium, 2002."},{"issue":"2","key":"BF03219915_CR12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"(S.) Prabhakar","year":"2003","unstructured":"Prabhakar (S.), Pankanti (S.), Jain, (A.K.), Biometric Recognition Security and Privacy Concerns,Ieee Security and Privacy,1, no. 2, pp. 33\u201342, 2003.","journal-title":"Ieee Security and Privacy"},{"key":"BF03219915_CR13","unstructured":"Ist \u2014 2002 \u2014 001766 Biometrics and Security (Biosec), Deliverable D3.3 \u2014 Security recommendations: biometric systems integration, basic research on security, network protocols andPki.Biosec consortium, 2005."},{"key":"BF03219915_CR14","unstructured":"Ts 33.102 \u2014 3G Security; Security architecture,3rd Generation Partnership Project, 2005."},{"key":"BF03219915_CR15","unstructured":"Article 29 \u2014Ec data protection working party, Working document on biometrics, 2003."},{"key":"BF03219915_CR16","first-page":"251","volume":"2162","author":"(K.) Gandolfi","year":"2001","unstructured":"Gandolfi (K.), Mourtel (C), Olivier, (F.), Electromagnetic Analysis: Concrete Results.Springer-Verlag Lecture Notes in Computer Science,2162, pp. 251\u2013261, 2001.","journal-title":"Electromagnetic Analysis: Concrete Results"},{"key":"BF03219915_CR17","unstructured":"Matsumoto (T.), Gummy finger and paper iris \u2014 an update.Proceeding of workshop on information security research, Japan, 2004."},{"key":"BF03219915_CR18","unstructured":"Glossary for theOasis Security Assertion Markup Language (Saml),Oasis, 2003."},{"key":"BF03219915_CR19","unstructured":"LibertyId-ff Protocols and Schema Specification,Liberty Alliance, 2003."},{"key":"BF03219915_CR20","unstructured":"LibertyId-ff Architecture Overview,Liberty Alliance, 2003."},{"key":"BF03219915_CR21","unstructured":"Davida (G. I.),Frankel (Y.),Matt (B.), on enabling secure applications through off-line biometrie,Symposium on Security and Privacy, 1998."},{"key":"BF03219915_CR22","doi-asserted-by":"crossref","unstructured":"Juels (A.),Wattenberg, (M.), A Fuzzy Commitment Scheme, In Proc.Acm Conf. Computer and Communications Security, pp. 28\u201336, 1999.","DOI":"10.1145\/319709.319714"},{"key":"BF03219915_CR23","unstructured":"Juels (A.),Sudan (M), A fuzzy vault scheme,In Conference on Computer and Communications Security, 2002."},{"key":"BF03219915_CR24","doi-asserted-by":"crossref","unstructured":"Linnartz (J.P.),Tuyls (P.), New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, InAvbpa, pp. 393\u2013402, 2003.","DOI":"10.1007\/3-540-44887-X_47"},{"key":"BF03219915_CR25","unstructured":"Verbitskjy (E.),Tuyls (P.),Denteneer (D.),Linnartz (J. P.), Reliable Biometric Authentication with Privacy Protection,In Proc. 24th Benelux Symposium on Information theory, 2003."},{"key":"BF03219915_CR26","unstructured":"Csirmaz (L.),Katona (G. O. H.), Geometrical Cryptography,In Proc. International Workshop on Coding and Cryptography, 2003."},{"key":"BF03219915_CR27","doi-asserted-by":"crossref","unstructured":"Frykholm (N.),Juels (A.), Error-Tolerant Password Recovery, In Proc.Acm Conf. Computer and Communications Security, pp. 1\u20138, 2001.","DOI":"10.1145\/501983.501985"},{"key":"BF03219915_CR28","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume":"3027","author":"(Y.) Dodis","year":"2004","unstructured":"Dodis (Y.), Reyzin (L.), Smith (A.), Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data,Advances in Cryptology \u2014 Eurocrypt 2004, Lecture Notes in Computer Science,3027, pp. 523\u2013540, 2004.","journal-title":"Advances in Cryptology \u2014 Eurocrypt 2004, Lecture Notes in Computer Science"},{"key":"BF03219915_CR29","first-page":"67","volume":"77","author":"(R.) Shaltiel","year":"2002","unstructured":"Shaltiel (R.), Recent developments in Explicit Constructions of Extractors. Bulletin of theEatcs,77, pp. 67\u201395, 2002","journal-title":"Bulletin of the Eatcs"},{"key":"BF03219915_CR30","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/S0167-739X(99)00055-2","volume":"16","author":"(C) Ellison","year":"2000","unstructured":"Ellison (C), Hall (C), Milbert (R.), Schneier (B.), Protecting Keys with Personal Entropy.Future Generation Computer Systems,16, pp. 311\u2013318, 2000.","journal-title":"Future Generation Computer Systems"},{"key":"BF03219915_CR31","doi-asserted-by":"crossref","unstructured":"Monrose (F.),Reiter (M. K.),Wetsel (S.), Password hardening based on keystroke dynamics.In Conference on Computer and Communications Security, 1999.","DOI":"10.1145\/319709.319720"},{"key":"BF03219915_CR32","unstructured":"TS 22.022 \u2014 Personalisation of Mobile Equipment (Me); Mobile functionality specification,3rd Generation Partnership Project, 2005."},{"key":"BF03219915_CR33","unstructured":"Assertions and Protocol for theOasis Security Assertion Markup Language (Saml),Oasis, 2003."},{"key":"BF03219915_CR34","unstructured":"Neimi (V),Nybero (K.),Umts Security,John Wiley & Sons, 2003."},{"issue":"6","key":"BF03219915_CR35","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MIC.2003.1250582","volume":"7","author":"(B.) Pfitzmann","year":"2003","unstructured":"Pfitzmann (B.), Waidner (M.), Analysis of Liberty Single-Signon with Enabled Clients,Ieee Internet Computing,7(6), pp. 38\u201344, 2003.","journal-title":"Ieee Internet Computing"},{"key":"BF03219915_CR36","unstructured":"Gross (T.), Security Analysis of theSaml Single Sign-on Browser\/Artifact Profile. 19th Annual Computer Security Applications Conference, 2003."},{"key":"BF03219915_CR37","doi-asserted-by":"crossref","unstructured":"Eastlake (D.),Crocker (S.),Schiller (J.), Randomness Recommendations for Security,Ietf rfc, 1994.","DOI":"10.17487\/rfc1750"},{"key":"BF03219915_CR38","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1007\/978-3-540-25948-0_98","volume":"3072","author":"(C) Dimitriadis","year":"2004","unstructured":"Dimitriadis (C), Polemi (D.), Application of multi-criteria analysis for the creation of a risk assessment knowledgebase for biometric systems.Lecture Notes in Computer Science,3072,Springer-Verlag,, Hong Kong, China (2004) pp. 724\u2013730","journal-title":"Lecture Notes in Computer Science"},{"key":"BF03219915_CR39","unstructured":"Biometrie Evaluation Methodology, Common Criteria Biometrie Evaluation Methodology Working Group, 2002."},{"key":"BF03219915_CR40","unstructured":"Iso\/iec 15408 Information technology \u2014 Security techniques \u2014 Evaluation criteria forIt security, 1999."},{"key":"BF03219915_CR41","unstructured":"Cc-Protection Profile: us Government biometrie verification mode protection \u2014 profile for medium robustness environment, 2003."},{"key":"BF03219915_CR42","unstructured":"Cc-Protection Profile: UK Biometrie Device \u2014 Draft, 2002."},{"key":"BF03219915_CR43","unstructured":"LibertyId-ff Implementation Guidelines,Liberty Alliance, 2004."},{"key":"BF03219915_CR44","unstructured":"LibertyId-ff Bindings and Profiles Specification,Liberty Alliance, 2003."},{"key":"BF03219915_CR45","unstructured":"Microsoft Corp.:Microsoft .Net passport review guide, http:\/\/www.passport.net, 2004."},{"key":"BF03219915_CR46","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/S1389-1286(00)00048-7","volume":"33","author":"(D.) Kormann","year":"2000","unstructured":"Kormann (D.), Rubin (A.), Risks of the Passport Single Signon Protocol.Computer Networks, Elsevier Science Press,33, pp51\u201358, 2000.","journal-title":"Computer Networks, Elsevier Science Press"},{"key":"BF03219915_CR47","unstructured":"Wayman (J.),Mansfield (A), Best practices of testing and reporting performance of biometrie devices,Cesg, http:\/\/www.cesg.gov.uk\/site\/ast\/biometrics\/media\/BestPractice.pdf, 2002."},{"key":"BF03219915_CR48","unstructured":"Ist-1999-20078 Business environment of biometrics involved in e-commerce \u2014Bee: Deliverable D6.2 Marketing & Business strategies, http:\/\/expertnet.net.gr\/bee,Bee Consortium, 2002."}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03219915.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03219915\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03219915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T09:59:37Z","timestamp":1561975177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03219915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4]]},"references-count":48,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,4]]}},"alternative-id":["BF03219915"],"URL":"https:\/\/doi.org\/10.1007\/bf03219915","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4]]}}}