{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:57:48Z","timestamp":1730249868445,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icmcs.2018.8525978","type":"proceedings-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T23:42:06Z","timestamp":1541720526000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Security Policy for Access Control to Academic Services Based on Public Key Infrastructures and Smart Cards"],"prefix":"10.1109","author":[{"given":"Moukhliss","family":"Ghizlane","sequence":"first","affiliation":[]},{"given":"Filali Hilali","family":"Reda","sequence":"additional","affiliation":[]},{"given":"Belhadaoui","family":"Hicham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"158","article-title":"Foiling the cracker. A survey of, and improvements to, password security","volume":"17","author":"klein","year":"1992","journal-title":"Programming and Computer Software"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/UIC-ATC-ScalCom.2014.35"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.giq.2014.12.004"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.jisa.2016.05.006"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.jisa.2014.09.006"},{"year":"2012","author":"wang","article-title":"Robust smart card based password authentication scheme against smart card security breach","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.3182\/20120523-3-RO-2023.00413"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.3182\/20120523-3-RO-2023.00398"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.ieri.2012.09.032"},{"key":"ref19","first-page":"24452","article-title":"An efficient password based authentication scheme using dynamic identity and smart card","volume":"10","author":"indrani","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.protcy.2013.12.476","article-title":"Features&#x2019; Evaluation of Goods, Services and E-Services","volume":"12","author":"taher","year":"2014","journal-title":"ESCE Procedia Technology"},{"year":"2016","author":"jean-fran\u00e7ois","journal-title":"La s&#x00E9;curit&#x00E9; informatique dans la petite entreprise Etat de l'art et Bonnes Pratiques","key":"ref3"},{"key":"ref6","article-title":"On security of multi-factor biometric authentication, Internet Technology and Secured Transactions (ICITST)","author":"al-assam","year":"0","journal-title":"2010 International Conference for Internet Technology and Secured Transactions ICITST"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TPDS.2010.206"},{"key":"ref8","article-title":"Smartcard-based remote authentication scheme preserving user anonymity","author":"shin","year":"0","journal-title":"International Journal of Information Processing and Management"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.ieri.2013.11.002"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.iheduc.2016.08.004"},{"key":"ref1","first-page":"10","author":"mouton","year":"2012","journal-title":"S&#x00E9;curit&#x00E9; de la d&#x00E9;mat&#x00E9;rialisation De la signature &#x00E9;lectronique au coffre-fort num&#x00E9;rique une d&#x00E9;marche de mise en oeuvre"},{"key":"ref9","first-page":"30","article-title":"Authentication schemes and methods: A systematic literature review","volume":"94","author":"vel\u00e1squez","year":"2018","journal-title":"IST"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.jisa.2017.08.004"},{"year":"2015","author":"dumas","journal-title":"Architectures PKI et communications s&#x00E9;curis&#x00E9;es","key":"ref21"}],"event":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","start":{"date-parts":[[2018,5,10]]},"location":"Rabat","end":{"date-parts":[[2018,5,12]]}},"container-title":["2018 6th International Conference on Multimedia Computing and Systems (ICMCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488380\/8525492\/08525978.pdf?arnumber=8525978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:40:36Z","timestamp":1643233236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8525978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icmcs.2018.8525978","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}