{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:27:07Z","timestamp":1746858427146,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/comm48946.2020.9141956","type":"proceedings-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T20:29:20Z","timestamp":1594931360000},"page":"139-144","source":"Crossref","is-referenced-by-count":7,"title":["Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint"],"prefix":"10.1109","author":[{"given":"Marius Iulian","family":"Mihailescu","sequence":"first","affiliation":[]},{"given":"Stefania","family":"Loredana Nita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FVC2000 DB1_B","year":"0","key":"ref39"},{"journal-title":"FVC2000 DB4_B","year":"0","key":"ref38"},{"journal-title":"FVC2000 DB3_B","year":"0","key":"ref33"},{"journal-title":"FVC2000 DB2_B","year":"0","key":"ref32"},{"journal-title":"FVC2000 DB1_B","year":"0","key":"ref31"},{"journal-title":"3FA-to-SE GitHub Repository","year":"0","key":"ref30"},{"journal-title":"FVC2000 DB3_B","year":"0","key":"ref37"},{"journal-title":"FVC2000 DB2_B","year":"0","key":"ref36"},{"journal-title":"FVC2000 DB1_B","year":"0","key":"ref35"},{"journal-title":"FVC2000 DB4_B","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.018"},{"journal-title":"FVC2000 DB2_B","year":"0","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2018.09.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101965"},{"key":"ref14","article-title":"A Hybrid Searchable Encryption Scheme for Cloud Computing","volume":"11359","author":"loredana","year":"2019","journal-title":"Innovative Security Solutions for Information Technology and Communications SECITC 2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.08.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.160"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"79","DOI":"10.14257\/ijsia.2017.11.12.07","article-title":"Searchable Encryption: A Review","volume":"11","author":"khadijah","year":"2017","journal-title":"International Journal of Security and its Applications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.12.004"},{"journal-title":"RNGCryptoServicePro-vider class","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.042"},{"journal-title":"Microsoft Cryptographic Service Providers","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107118"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.014"},{"journal-title":"StringBuilder class","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.063"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101745"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102429"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101619"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.150"},{"key":"ref21","first-page":"348","article-title":"A Multi-Factor Authentication Scheme Including Biometric Characteristics as One Factor","volume":"xviii","author":"mihailescu","year":"2015","journal-title":"1st International Conference Sea-Conf Mircea cel Batran Naval Academy Scientific Bulletin"},{"journal-title":"FVC2000 DB4_B","year":"0","key":"ref42"},{"key":"ref24","article-title":"A Multifactor Secure Authentication System For Wireless Payment","author":"sanyal","year":"2007","journal-title":"IADIS International Conference on Applied Computing Proceedings of the IADIS International Conference on Applied Computing"},{"journal-title":"FVC2000 DB3_B","year":"0","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.08.024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2008.92"},{"journal-title":"FPR Framework","year":"0","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179540"}],"event":{"name":"2020 13th International Conference on Communications (COMM)","start":{"date-parts":[[2020,6,18]]},"location":"Bucharest, Romania","end":{"date-parts":[[2020,6,20]]}},"container-title":["2020 13th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9139890\/9141948\/09141956.pdf?arnumber=9141956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:54:07Z","timestamp":1656345247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9141956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/comm48946.2020.9141956","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}