{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:22:59Z","timestamp":1726410179424},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157165"},{"type":"electronic","value":"9783642157172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15717-2_11","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T13:25:30Z","timestamp":1283347530000},"page":"87-95","source":"Crossref","is-referenced-by-count":2,"title":["Multimodal Biometrics and Multilayered IDM for Secure Authentication"],"prefix":"10.1007","author":[{"given":"Abdullah","family":"Rashed","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Ross, A., Jain, A.: Multimodal Biometrics: An Overview. In: Proceedings of 12th European Signal Processing Conference (EUSIPCO), Vienna, Austria, pp. 1221\u20131224 (2004)"},{"key":"11_CR2","unstructured":"Rashed, A.: Intelligent Encryption Decryption Systems Using Genetic Algorithms, Ph.D. Dissertation, Arab Academy, Amman, Jordan (2004)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Squicciarini, A., Czeskis Bhargav-Spantzel, A.: Privacy policies compliance across digital identity anagement systems. In: SPRINGL 2008, pp. 72\u201381 (2008)","DOI":"10.1145\/1503402.1503416"},{"key":"11_CR4","unstructured":"Lakshmi, B., Kannammal, A.: Secured Authentication of Space Specified Token with Biometric Traits \u2013 Face and Fingerprint. IJCSNS International Journal of Computer Science and Network Security\u00a09(7) (2009)"},{"key":"11_CR5","unstructured":"Cisco Systems, Inc., Intel: Five Myths of Wireless Networks (2006), http:\/\/www.ciscosystems.lt\/en\/US\/...\/prod_white_paper0900aecd805287fc.pdf"},{"key":"11_CR6","unstructured":"Birch, D.: Digital Identity Management. Gower (2007) ISBN: 978-0-566-08679-3"},{"key":"11_CR7","unstructured":"Taylor, D.S.: Multi-Layered Approach to Small Office Networking, the SANS Institute Reading Room site (2001), www.sans.org\/..\/hsoffice\/multilayered_approach_to_small_office_networking_624"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Arcieri, F., Ciclosi, M., Dimitr, A., Fioravanti, F., Nardelli, E., Talamo, M.: The Italian Electronic Identity Card: Overall Architecture and IT infrastructure. In: 2nd International Workshop on Certification and Security in Inter-Organizational E-Services (CSES 2004), Toulouse, France. IFIP Conference Proceedings, vol.\u00a0306, pp. 5\u201318 (2000)","DOI":"10.1007\/11397427_1"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Ahn, G., Lam, J.: Managing Privacy Preferences for Federated Identity Management, Workshop On Digital Identity Management. In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, SESSION: Privacy protection, pp. 28\u201336 (2005)","DOI":"10.1145\/1102486.1102492"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Gomi, H., Fujita, S.: A Delegation Framework for Federated Identity Management. In: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 94\u2013103 (2005)","DOI":"10.1145\/1102486.1102502"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Leitold, H., Hollosi, A., Posch, R.: Security Architecture of the Austrian Citizen Card Concept. In: 18th Annual Computer Security Applications Conference, San Diego, California, December 09 - 13, pp. 391\u2013403 (2002)","DOI":"10.1109\/CSAC.2002.1176311"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Abhi, S., Sommer, D., Fischer-H\u00fcbner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J.: Privacy and Identity Management for Everyone. In: Proceedings of the 2005 workshop on Digital Identity Management. Fairfax, VA, USA, SESSION: Privacy protection, pp. 20\u201327 (2005)","DOI":"10.1145\/1102486.1102491"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.istr.2007.05.007","volume":"12","author":"J. Zhou","year":"2007","unstructured":"Zhou, J., Chin, W., Roman, R., Lopez, J.: An Effective Multi-layered Defense Framework Against Spam. Information Security Technical Report\u00a012(3), 179\u2013185 (2007)","journal-title":"Information Security Technical Report"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Thyne, R.: Privacy policy Enforcement in Enterprises with Identity Management Solutions. In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. SESSION: Privacy technologies, Markham, Ontario, Canada, vol.\u00a0380, Article No. 25 (2006)","DOI":"10.1145\/1501434.1501465"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Tamassia, R., Yao, D.: Notarized Federated Identity Management for Web Services. In: DBSec 2006, p. 133 (2006)","DOI":"10.1007\/11805588_10"},{"issue":"13-15","key":"11_CR16","doi-asserted-by":"publisher","first-page":"3026","DOI":"10.1016\/j.neucom.2007.12.017","volume":"71","author":"M.K. Khan","year":"2006","unstructured":"Khan, M.K., Zhang, J.: Multimodal Face and Fingerprint Biometrics Authentication on Space-Limited Tokens. Neurocomputing\u00a071(13-15), 3026\u20133031 (2006)","journal-title":"Neurocomputing"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Rundle, M., Ben Laurie, B.: Identity Management as a Cybersecurity Case Ctudy. In: Oxford Internet Institute Conference \u2013 Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Research Publication No. 2006-01. The Berkman Center for Internet & Society Research Publication Series (September 2005), http:\/\/cyber.law.harvard.edu\/publications","DOI":"10.2139\/ssrn.881107"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Madsen, P., Koga, Y., Takahashi, K.: Federated Identity Management for Protecting Users from ID Theft. In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, pp. 77\u201383 (2005)","DOI":"10.1145\/1102486.1102500"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Clau\u03b2, S., Kesdogan, D., Klsch, T.: Privacy Enhancing Identity Management: Protection Against Re-Identification and Profiling. In: Proceedings of the 2005 workshop on Digital identity management. SESSION: DIM frameworks, Fairfax, VA, USA, pp. 84\u201393 (2005) ISBN:1-59593-232-1","DOI":"10.1145\/1102486.1102501"},{"issue":"3","key":"11_CR20","doi-asserted-by":"crossref","first-page":"249","DOI":"10.3233\/JCS-2006-14302","volume":"14","author":"T. Candebat","year":"2006","unstructured":"Candebat, T., Gray, D.: Secure Pseudonym Management Using Mediated Identity-based Encryption. Journal of Computer Security\u00a014(3), 249\u2013267 (2006)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"11_CR21","first-page":"23","volume":"1","author":"T. Gayathri","year":"2009","unstructured":"Gayathri, T., Venkadajothi, S., Kalaivani, S., Divya, C., Dhas, S., Sakunthala, R.: Mobile Multilayer IPsec Protocol. International Journal of Engineering and Technology\u00a01(1), 23\u201329 (2009)","journal-title":"International Journal of Engineering and Technology"},{"key":"11_CR22","unstructured":"Wikipedia website, Identity Management Dimensions, http:\/\/www.en.wikipedia.org"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Beres, Y., Baldwin, A., Casassa, M., Mont Shiu, S.: On Identity Assurance in the Presence of federated Identity Management Systems. Digital Identity Management, 27\u201335 (2007)","DOI":"10.1145\/1314403.1314409"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety, and Sustainability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15717-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:12:56Z","timestamp":1606187576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15717-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157165","9783642157172"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15717-2_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}