{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:03:35Z","timestamp":1761581015116},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/icb.2012.6199798","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T17:11:43Z","timestamp":1344445903000},"page":"490-497","source":"Crossref","is-referenced-by-count":7,"title":["Biometric access control using Near Field Communication and smart phones"],"prefix":"10.1109","author":[{"given":"Mohammad Omar","family":"Derawi","sequence":"first","affiliation":[]},{"given":"Simon","family":"McCallum","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Witte","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Bours","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"journal-title":"Retailers Fingerprint Plans Prompt Privacy Concerns [Online Accessed 13-February-2011]","year":"0","key":"17"},{"journal-title":"Safety & Security of U s Borders Biometrics","year":"0","key":"18"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"journal-title":"NFC Forum Specifications","year":"0","key":"13"},{"year":"0","key":"14"},{"journal-title":"Ndef Push Protocol Specification","year":"0","key":"11"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2010.71"},{"key":"20","article-title":"Fingerprint recognition with embedded cameras on mobile phones","author":"derawi","year":"2011","journal-title":"3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems MobiSec 2011"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2009.12.003"},{"journal-title":"Security in NFC with Wi]Fi Protected Setup As A Use","year":"2008","author":"holien","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.105"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.50"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1023799"},{"year":"0","key":"3"},{"journal-title":"Eu fp7 Integrated Project - Trusted Revocable Biometric Identities","year":"0","key":"2"},{"journal-title":"Method For Fingerprint Identification","year":"0","key":"10"},{"year":"0","key":"1"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"journal-title":"Fingerprint Biometric Retail Pos Systems on Show","year":"0","key":"5"},{"journal-title":"Fetal Development","year":"0","key":"4"},{"year":"0","key":"9"},{"journal-title":"ISO\/IEC FDIS 24745 Information Technology - Security Techniques - Biometric Information Protection","year":"2011","key":"8"}],"event":{"name":"2012 5th IAPR International Conference on Biometrics (ICB)","start":{"date-parts":[[2012,3,29]]},"location":"New Delhi, India","end":{"date-parts":[[2012,4,1]]}},"container-title":["2012 5th IAPR International Conference on Biometrics (ICB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6195082\/6199747\/06199798.pdf?arnumber=6199798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:53:51Z","timestamp":1490140431000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6199798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icb.2012.6199798","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}