{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:25:53Z","timestamp":1729653953801,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1109\/icme.2001.1237691","type":"proceedings-article","created":{"date-parts":[[2005,8,25]],"date-time":"2005-08-25T08:25:34Z","timestamp":1124958334000},"page":"202-205","source":"Crossref","is-referenced-by-count":1,"title":["Secure network communication using biometrics"],"prefix":"10.1109","author":[{"given":"M.","family":"Rahman","sequence":"first","affiliation":[]},{"given":"P.","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A one-time password system","year":"0","key":"17"},{"journal-title":"Cryptography and Network Security","year":"1999","author":"stallings","key":"15"},{"journal-title":"Building Internet Firewalls","year":"2000","author":"zwicky","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_7"},{"key":"14","first-page":"1343","article-title":"Special issue on automated biometrics","volume":"85","author":"shen","year":"1997","journal-title":"Proceedings of the IEEE"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"journal-title":"Ipsec The New Security Standard for the Inter- Net Intranets and Virtual Private Networks","year":"1999","author":"doraswamy","key":"12"},{"journal-title":"Firewalls and Internet Security","year":"1994","author":"cheswick","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0015972","author":"bigun","year":"1997","journal-title":"Proceedings of the First Intenat Conference of Audio- and Video- Biometric Person Authentication ABVA'97"},{"journal-title":"Secure System and Method for Accessing Files in Computers Using Fingerprints","year":"0","author":"bhattacharya","key":"1"},{"journal-title":"Network Security","year":"1995","author":"kaufman","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/34.587996"},{"journal-title":"Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information","year":"1996","author":"gelb","key":"6"},{"journal-title":"Secure socket layer application program apparatus and method","year":"1997","author":"elgamal","key":"5"},{"journal-title":"Secure socket layer application program apparatus and method","year":"1998","author":"elgamal","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_2"},{"journal-title":"Biometrics Personal Identification in Networked Society","year":"1999","author":"jain","key":"8"}],"event":{"name":"IEEE International Conference on Multimedia and Expo, 2001. ICME 2001","start":{"date-parts":[[2001,8,22]]},"location":"Tokyo, Japan","end":{"date-parts":[[2001,8,25]]}},"container-title":["IEEE International Conference on Multimedia and Expo, 2001. ICME 2001."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8766\/27769\/01237691.pdf?arnumber=1237691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T22:55:59Z","timestamp":1497653759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1237691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icme.2001.1237691","relation":{},"subject":[],"published":{"date-parts":[[2001]]}}}