{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:32Z","timestamp":1740122372036,"version":"3.37.3"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"ByungRae Cha"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10586-016-0666-6","type":"journal-article","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:33:16Z","timestamp":1477096396000},"page":"1865-1878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Availability analysis and case study of mobile-OTP key generation using skip sampling of voice"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6686-5400","authenticated-orcid":false,"given":"ByungRae","family":"Cha","sequence":"first","affiliation":[]},{"given":"Sun","family":"Park","sequence":"additional","affiliation":[]},{"given":"JongWon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"issue":"3","key":"666_CR1","first-page":"348","volume":"13","author":"Lee DaeJong","year":"2003","unstructured":"DaeJong, Lee, et al.: Advanced personal identification system using Iris and voice. J. Fuzzy Intell. Syst. Soc. 13(3), 348\u2013354 (2003)","journal-title":"J. Fuzzy Intell. Syst. Soc."},{"issue":"4","key":"666_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/79.317924","volume":"II","author":"H Gish","year":"1994","unstructured":"Gish, H., Schmidt, M.: Text-independent speaker identification. IEEE Signal Process. Mag. II(4), 18\u201332 (1994)","journal-title":"IEEE Signal Process. Mag."},{"key":"666_CR3","doi-asserted-by":"crossref","unstructured":"Reynolds, D.A.: An overview of automatic speaker recognition technology. In: ICASSP 2002, pp. 4072\u20134075 (2002)","DOI":"10.1109\/ICASSP.2002.5745552"},{"key":"666_CR4","unstructured":"Telecommunications Technology Association (TTA): Guidelines for BioInfo Protection, IT Group Standards, 2005.12, pp. 2\u20134"},{"key":"666_CR5","unstructured":"OTP Systems: Mobile One-Time Password. http:\/\/www.otp.com.tw\/Index\/Section\/23"},{"key":"666_CR6","unstructured":"vidoopSecure: Voice OTP. https:\/\/login.vidoop.com\/docs\/voice-otp"},{"key":"666_CR7","unstructured":"BIOMETRY.com AG: MobiComBiom, Mobile Communication Biometrics. http:\/\/www.biometry.com\/perma-voice.html"},{"issue":"4","key":"666_CR8","doi-asserted-by":"crossref","first-page":"268","DOI":"10.4103\/0256-4602.52996","volume":"26","author":"B Cha","year":"2009","unstructured":"Cha, B., Ko, F.I.S.: Novel OTP system design using homomorphic graph of fingerprints. IETE Tech. Rev. 26(4), 268\u2013279 (2009)","journal-title":"IETE Tech. Rev."},{"issue":"4","key":"666_CR9","first-page":"512","volume":"14","author":"B Cha","year":"2010","unstructured":"Cha, B., Kim, N., Kim, J.: Design of OTP based on mobile device using voice. J. Korea Navig. Inst. 14(4), 512\u2013520 (2010)","journal-title":"J. Korea Navig. Inst."},{"key":"666_CR10","unstructured":"Cha, B., Kim, N., Kim, J: Prototype analysis of OTP key-generation based on mobile device using voice characterstics. In: ICISA 2011, April 2011"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0666-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0666-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0666-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:51:34Z","timestamp":1498341094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0666-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["666"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0666-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}