{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:46Z","timestamp":1759133506763,"version":"3.40.4"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computational Intelligence Systems"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1080\/18756891.2011.9727801","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T20:20:26Z","timestamp":1367526026000},"page":"420-430","source":"Crossref","is-referenced-by-count":7,"title":["Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System"],"prefix":"10.1007","volume":"4","author":[{"given":"Jackson","family":"Phiri","sequence":"first","affiliation":[]},{"given":"Tie-Jun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Cong Hui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jameson","family":"Mbale","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"CIT0001","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1353-4858(06)70411-1","volume":"2006","author":"Mike S.","year":"2006","journal-title":"Network Security"},{"issue":"2","key":"CIT0002","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"Dhamija R.","year":"2008","journal-title":"Security & Privacy, IEEE"},{"issue":"3","key":"CIT0003","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.clsr.2009.03.009","volume":"25","author":"Clare S.","year":"2009","journal-title":"Computer Law & Security Review, Elsevier"},{"issue":"2","key":"CIT0004","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.istr.2008.07.002","volume":"13","author":"Geraint P.","year":"2008","journal-title":"Information Security Technical Report, Elsevier"},{"issue":"1","key":"CIT0005","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MIC.2005.16","volume":"19","author":"Goth G.","year":"2005","journal-title":"Internet Computing, IEEE"},{"issue":"1","key":"CIT0006","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/S1363-4127(04)00012-3","volume":"9","author":"Geoff B.","year":"2004","journal-title":"Information Security Technical Report"},{"issue":"2","key":"CIT0007","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.istr.2008.06.003","volume":"13","author":"Marit H.","year":"2008","journal-title":"Information Security Technical Report, Elsevier"},{"volume-title":"EconomyWatch, List of Commercial Banks","year":"2011","key":"CIT0008"},{"volume-title":"Wikipedia, The free encyclopedia, Civil service","year":"2011","key":"CIT0009"},{"volume-title":"QS World University Rankings","year":"2011","key":"CIT0010"},{"volume-title":"100 Top Hospitals","year":"2011","author":"Reuters Thomson","key":"CIT0011"},{"volume-title":"Google Double Click Ad Planner","year":"2010","key":"CIT0012"},{"volume-title":"The free encyclopedia, List of social networking websites","year":"2011","key":"CIT0013"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Anthony, L. AntConc: Design and Development of a Freeware Corpus Analysis Toolkit for the Technical Writing Classroom. Professional Communication Conference Proceedings. pp.729 doi:10.1109\/IPCC.2005.1494244","DOI":"10.1109\/IPCC.2005.1494244"},{"volume-title":"ConcApp Version 4 Concordancer, Edict Virtual Language Centre","year":"2010","author":"Greaves C.","key":"CIT0015"},{"volume-title":"TextSTAT Corpus","year":"2010","key":"CIT0016"},{"volume-title":"Fundamentals of Information Theory and Coding Design","year":"2005","author":"Togneri R.","key":"CIT0017"},{"key":"CIT0018","volume-title":"Artificial Intelligence: A Guide to Intelligent Systems","author":"Negnevitsky M.","year":"2005","edition":"2"},{"issue":"3","key":"CIT0019","doi-asserted-by":"crossref","first-page":"4321","DOI":"10.1016\/j.eswa.2008.03.002","volume":"36","author":"Chih-Hung W.","year":"2009","journal-title":"Expert Systems with Applications"},{"issue":"5","key":"CIT0020","first-page":"666","volume":"11","author":"Fazle Azeem M.","journal-title":"Fuzzy Systems, IEEE Transactions"},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"Agbinya, J. I., Islam, R. and Kwok, C. Development of Digital Environment Identity (DEITY) System for Online Access. Broadband Communications, Information Technology & Biomedical Applications, Third Int. Conf. pp.23\u201326. Australia doi: 10.1109\/BROADCOM.2008.52","DOI":"10.1109\/BROADCOM.2008.52"},{"issue":"5","key":"CIT0022","doi-asserted-by":"crossref","first-page":"1789","DOI":"10.1016\/j.patcog.2009.11.018","volume":"43","author":"He M.","year":"2010","journal-title":"Pattern Recognition"},{"issue":"1","key":"CIT0023","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.eswa.2010.06.006","volume":"38","author":"Nanni L.","year":"2011","journal-title":"Expert Systems with Applications"},{"journal-title":"Microsoft Architect Journey","year":"2004","author":"Chong F.","key":"CIT0024"},{"volume-title":"RFID and identity management in everyday life","year":"2010","key":"CIT0025"},{"key":"CIT0026","unstructured":"The National Electronic Commerce Coordinating Council (NECCC). Identity Management. Presented at the NECCC Annual Conference. New York"},{"key":"CIT0027","doi-asserted-by":"crossref","DOI":"10.1109\/MSP.2008.41","volume":"6","author":"Hansen M.","year":"2008","journal-title":"Security & Privacy, IEEE"},{"key":"CIT0028","doi-asserted-by":"crossref","unstructured":"Barisch, M. Modelling the Impact of Virtual Identities on Communication Infrastructures, Conference on Computer and Communications Security. Proc. of the 5th ACM workshop, Digital identity management. pp.45\u201352. Chicago, Illinoisdoi: http:\/\/doi.acm.org\/10.1145\/1655028.1655040","DOI":"10.1145\/1655028.1655040"},{"key":"CIT0029","unstructured":"Hidehito, G. User-Centric Identity Governance Across Domain Boundaries, Conference on Computer and Communications Security. Proc. of the 5th ACM workshop, Digital identity management. pp.35\u201344. Chicago, Illinoisdoi: http:\/\/doi.acm.org\/10.1145\/1655028.1655038"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Avram, V. Defining metrics to automate the quantitative analysis of textual information within a web page. Int. Conf. of Application of Information and Communication Technologies, (AICT 2009). pp.1\u20135. doi: http:\/\/dx.doi.org\/10.1109\/ICAICT.2009.5372575","DOI":"10.1109\/ICAICT.2009.5372575"},{"key":"CIT0031","doi-asserted-by":"crossref","unstructured":"Kaddi, C., Oden, E. D., Quo, C. F. and Wang, M. D. Exploration of Quantitative Scoring Metrics to Compare Systems Biology Modeling Approaches. Int. Conf. of Engineering in Medicine and Biology Society (EMBS 2007). pp.1121\u20131124. doi: http:\/\/dx.doi.org\/10.1109\/IEMBS.2007.4352493","DOI":"10.1109\/IEMBS.2007.4352493"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.04.030"},{"key":"CIT0033","doi-asserted-by":"crossref","unstructured":"Mazlack, L. and Coppock, S. Granulating data on non-scalar attribute values. Proc. of the 2002 IEEE Int. Conf. on Fuzzy Systems. pp.944\u2013949. doi: http:\/\/dx.doi.org\/10.1109\/FUZZ.2002.1006631","DOI":"10.1109\/FUZZ.2002.1006631"},{"key":"CIT0034","doi-asserted-by":"crossref","unstructured":"Phiri, J. and Zhao, T. J. Identity attributes quantitative analysis and the development of a metrics model using text mining techniques and information theory. Int. conf. on Information Theory and information security (ICITIS2010). pp.390\u2013393. Beijing doi: 10.1109\/ICITIS.2010.5689588","DOI":"10.1109\/ICITIS.2010.5689588"},{"volume-title":"Probability and Information: An Integrated Approach","year":"1996","author":"Applebaum D.","key":"CIT0035"},{"issue":"4","key":"CIT0036","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S1006-1266(07)60153-9","volume":"17","author":"Zhang X.","year":"2007","journal-title":"Journal of China University of Mining and Technology"},{"volume-title":"Search Engines: Information Retrieval in Practise","year":"2010","author":"Croft B.","key":"CIT0037"},{"issue":"3","key":"CIT0038","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.compchemeng.2005.11.002","volume":"30","author":"Zhang J.","year":"2006","journal-title":"Computers & Chemical Engineering"},{"issue":"6","key":"CIT0039","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1016\/j.ymssp.2007.11.025","volume":"22","author":"Hui L.","year":"2008","journal-title":"Mechanical Systems and Signal Processing"},{"issue":"1","key":"CIT0040","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jss.2009.06.041","volume":"83","author":"Kitchenham B.","year":"2010","journal-title":"Elsevier, Journal of Systems and Software"},{"key":"CIT0041","doi-asserted-by":"crossref","unstructured":"Phiri, J. and Agbinya, J. I. Modelling and Information Fusion in Digital Identity Management Systems. Int. Conf. on Systems and Int. Conf. on Mobile Communications and Learning Technologies. pp.181\u2013186. Mauritius doi: 10.1109\/ICNICONSMCL.2006.152","DOI":"10.1109\/ICNICONSMCL.2006.152"},{"volume-title":"Fuzzy logic toolbox manual","year":"2010","key":"CIT0042"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/18756891.2011.9727801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:04:23Z","timestamp":1746000263000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/18756891.2011.9727801"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["10.1080\/18756891.2011.9727801"],"URL":"https:\/\/doi.org\/10.1080\/18756891.2011.9727801","relation":{},"ISSN":["1875-6891","1875-6883"],"issn-type":[{"type":"print","value":"1875-6891"},{"type":"electronic","value":"1875-6883"}],"subject":[],"published":{"date-parts":[[2011,6]]}}}