{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T13:27:54Z","timestamp":1648906074694},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/bf03253254","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"156-176","source":"Crossref","is-referenced-by-count":0,"title":["Beyond objective performance evaluation in multimodal biometric systems"],"prefix":"10.1007","volume":"62","author":[{"given":"Doroteo T.","family":"Toledano","sequence":"first","affiliation":[]},{"given":"\u00c1lvaro","family":"Hern\u00e1ndez Trapote","sequence":"additional","affiliation":[]},{"given":"David","family":"D\u00edaz Pardo de Vera","sequence":"additional","affiliation":[]},{"given":"Rub\u00e9n","family":"Fern\u00e1ndez Pozo","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Hern\u00e1ndez G\u00f3mez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03253254_CR1","volume-title":"Department of Statistics, UCLA. Department of Statistics Papers","author":"R. Berk","year":"2001","unstructured":"Berk R., Freedman D.A. (2001), Statistical Assumptions as Empirical Commitments. Department of Statistics, UCLA. Department of Statistics Papers, Paper 2001080101, 22nd August 2001, http:\/\/repositories.cdlib.org\/uclastat\/papers\/2001080101 (Accessed: 28th March 2006)."},{"key":"BF03253254_CR2","volume-title":"BioSec: Biometrics and Security","author":"BioSec","year":"2003","unstructured":"BioSec (2003), BioSec: Biometrics and Security, http:\/\/www.biosec.org\/"},{"key":"BF03253254_CR3","volume-title":"Roadmap for Biometrics in Europe to 2010","author":"V. Bio","year":"2003","unstructured":"Bio Vision (2003), Roadmap for Biometrics in Europe to 2010 Available: http:\/\/www.eubiometricsforum.com\/dmdocuments\/Biovision_Roadmap.pdf (Accessed:, 27th July 2004)."},{"key":"BF03253254_CR4","volume-title":"International Conference on Biometric Authentication","author":"Bknc","year":"2003","unstructured":"Bknc (2003), A Biometric Research Agenda and the Course of Biometrics Research, International Conference on Biometric Authentication, Biometrie Knowledge Centre, West Virginia University, http:\/\/www.wvu.edu\/~bknc\/BiometricResearchAgenda.pdf"},{"key":"BF03253254_CR5","first-page":"955","volume":"12","author":"R. Brunelli","year":"1995","unstructured":"Brunelli R., Falavigna D. (1995), Person identification using multiple cues, IEEE Transactions on PAMI, 12, n\u00b0 10, pp. 955\u2013966, October 1995.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253254_CR6","volume-title":"Proceedings of the IEEE","author":"J. P. Campbell","year":"1997","unstructured":"Campbell J. P. (1997), Speaker Recognition: A Tutorial, Proceedings of the IEEE, 85, n\u00b0 9, September 1997."},{"key":"BF03253254_CR7","volume-title":"Communication Intelligence Corporation","author":"Cic","year":"2004","unstructured":"Cic (2004), iSign for Java, Communication Intelligence Corporation, http:\/\/www.cic.com\/products\/isign\/#iSignJava"},{"key":"BF03253254_CR8","volume-title":"Hillsdatle","author":"J. Cohen","year":"1998","unstructured":"Cohen J. (1998), Statistical Power Analysis for the Behavioral Sciences (2nd Ed), Hillsdatle, NJ, Earlbaum."},{"key":"BF03253254_CR9","volume-title":"Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation","author":"G. Doddington","year":"1998","unstructured":"Doddington G., Liggett W., Martin A., Przybocki M., Reynolds D. (1998), Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. ICSLP, November 1998."},{"key":"BF03253254_CR10","volume-title":"Proceedings of the Thirty-Fifth Annual Hawaii International Conference on System Sciences","author":"B. Friedman","year":"2002","unstructured":"Friedman B., Howe D.C., Felten E. (2002), Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design, Proceedings of the Thirty-Fifth Annual Hawaii International Conference on System Sciences. Available at: http:\/\/www.ischool.washington.edu\/networksecurity\/outcomes.html (Accessed: 27th July 2004)."},{"key":"BF03253254_CR11","volume-title":"IEEE Signal Processing Magazine","author":"H. Gish","year":"1994","unstructured":"Gish H., Schmidt M. (1994), Text-Independent Speaker Identification, IEEE Signal Processing Magazine, October 1994."},{"key":"BF03253254_CR12","volume-title":"Haptek","author":"Haptek","year":"2004","unstructured":"Haptek (2004), Haptek, http:\/\/www.haptek.com\/"},{"key":"BF03253254_CR13","volume-title":"Standarization of accuracy evaluation for biometric authentication in Japan","author":"Hitachi","year":"2002","unstructured":"Hitachi (2002). Standarization of accuracy evaluation for biometric authentication in Japan. Available at: http:\/\/www.sdl.hitachi.co.jp\/ipa_biotest\/english\/index_english.html (Accessed: 27th July 2004)."},{"key":"BF03253254_CR14","volume-title":"Thousand Oaks, CA: Sage","author":"R. H. Hoyle","year":"1999","unstructured":"Hoyle R. H. Ed. (1999), Statistical Strategies for Small Sample Research, Thousand Oaks, CA: Sage."},{"key":"BF03253254_CR15","volume-title":"American National Standards Institute","author":"Iso\/iec jtc 1\/sc 37 19795-1","year":"2006","unstructured":"Iso\/iec jtc 1\/sc 37 19795-1 (2006), Biometrie Performance Testing and Reporting, Part 1: Test Principles. American National Standards Institute."},{"key":"BF03253254_CR16","first-page":"187","volume":"55","author":"R.V. Lenth","year":"2001","unstructured":"Lenth R.V. (2001), Some Practical Guidelines for Effective Sample Size Determination, The American Statistician, 55, n\u00b0 3, pp. 187\u2013193, 2001.","journal-title":"Annales Des T\u00e9l\u00e9communications"},{"key":"BF03253254_CR17","volume-title":"Proceedings of the Communications and Multimedia Security Conference","author":"V. Matyas","year":"2002","unstructured":"Matyas V., Riha Z. (2002), Biometrie Authentication \u2014 Security and Usability, Proceedings of the Communications and Multimedia Security Conference. Available at: http:\/\/www.fi.muni.cz\/usr\/matyas\/cms_matyas_riha_biometrics.pdf (Accessed: 27th July 2004)."},{"key":"BF03253254_CR18","first-page":"206","volume-title":"Proceedings of InterCHI","author":"J. Nielsen","year":"1993","unstructured":"Nielsen J., Landauer T.R. (1993), A Mathematical Model of the Finding of Usability Problems, Proceedings of InterCHI, 1993, pp. 206\u2013213."},{"key":"BF03253254_CR19","volume-title":"Nuance Communications Inc","author":"Nuance","year":"2004","unstructured":"Nuance (2004), Nuance Communications Inc, http:\/\/www.nuance.com"},{"key":"BF03253254_CR20","volume-title":"Proceedings of the Financial Cryptography Conference (FC04)","author":"A.S. Patric","year":"2004","unstructured":"Patric A.S. (2004), Usability and Acceptability of Biometrie Security Systems, Proceedings of the Financial Cryptography Conference (FC04), West FL."},{"key":"BF03253254_CR21","volume-title":"IEEE International Workshop on Neural Networks for Signal Processing (NNSP)","author":"N. Poh","year":"2002","unstructured":"Poh N., Bengio S., Korczak J., A Multi-sample Multi-source Model for Biometrie Authentication, IEEE International Workshop on Neural Networks for Signal Processing (NNSP), 2002."},{"key":"BF03253254_CR22","volume-title":"Precise Biometrics","author":"B. Precise","year":"2004","unstructured":"Precise Biometrics (2004), Precise Biometrics, http:\/\/www.precisebiometrics.com\/"},{"key":"BF03253254_CR23","volume-title":"University College London","author":"M.A. Sasse","year":"2004","unstructured":"Sasse M.A. (2004), Usability and trust in information systems. Cyber Trust & Crime Prevention Project. University College London, UK."},{"key":"BF03253254_CR24","volume-title":"GMD-German National Research Center for Information Technology, Institute for Secure Telecooperation (SIT)","author":"D. Scheuermann","year":"2000","unstructured":"Scheuermann D., Schwiderski-Grosche S., Struif B. (2000), Usability of Biometrics in Relation to Electronic Signatures, EU Study 502533\/8. GMD-German National Research Center for Information Technology, Institute for Secure Telecooperation (SIT)."},{"key":"BF03253254_CR25","volume-title":"Better Design \u2014 The Burglar Alarm","author":"R. Seymour","year":"2000","unstructured":"Seymour R., Powel D. (2000), Better Design \u2014 The Burglar Alarm, http:\/\/www.designcouncil.info\/betterbydesign\/security\/challenge.html (Accessed: 27th July 2004)."},{"key":"BF03253254_CR26","volume-title":"SISA: Simple Interactive Statistical Analysis","author":"D.G. Uitenbroek","year":"1997","unstructured":"Uitenbroek D.G. (1997), SISA: Simple Interactive Statistical Analysis, Available: http:\/\/home.clara.net\/sisa\/ (Accessed: 14th July 2004)."},{"key":"BF03253254_CR27","volume-title":"Biometrics Enrolment Trial Report","author":"Uk Passport Service","year":"2005","unstructured":"Uk Passport Service (2005), Biometrics Enrolment Trial Report. Available: http:\/\/www.passport.gov.uk\/downloads\/UKPSBiometrics_Enrolment_Trial_Report.pdf (Accessed: 5th March 2006)."},{"key":"BF03253254_CR28","volume-title":"Psi Chi Journal","author":"C.W. VanVoorhis","year":"2001","unstructured":"VanVoorhis C.W., Morgan B.L. (2001), Statistical Rules of Thumb: What We Don\u2019t Want to Forget About Sample Sizes, Psi Chi Journal, Issue 4, Available: http:\/\/www.psichi.org\/pubs\/articles\/article_182.asp (Accessed: 28th March 2006)."},{"key":"BF03253254_CR29","volume-title":"Cambridge MA: MIT Press","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann P.R. (1995), The Official PGP User\u2019s Guide, Cambridge MA: MIT Press."}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253254.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03253254\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253254.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T07:51:51Z","timestamp":1625644311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03253254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":29,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["BF03253254"],"URL":"https:\/\/doi.org\/10.1007\/bf03253254","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}