{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:29:08Z","timestamp":1729625348954,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isias.2015.7492746","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:14:55Z","timestamp":1466108095000},"page":"61-66","source":"Crossref","is-referenced-by-count":3,"title":["Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment"],"prefix":"10.1109","author":[{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Zaid Alaa","family":"Hussien","sequence":"additional","affiliation":[]},{"given":"Ali A.","family":"Yassin","sequence":"additional","affiliation":[]},{"given":"Mohammed Abdulridha","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Salah H.","family":"Abbdal","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.884895"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2013","author":"stallings","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.03.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286645"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.36"},{"journal-title":"Cloud Computing A Practical Approach","year":"2010","author":"velte","key":"ref3"},{"key":"ref6","first-page":"1236","article-title":"A hash-based secure interface on plain connection","author":"liu","year":"2011","journal-title":"Proceedings of the sixth International Conference on Communications and Networking in China '11)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2010.5648278"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/978-94-007-2598-0_66","article-title":"Facsimile Authentication Based on MAC","volume":"107","author":"chaisri","year":"2012","journal-title":"IT Convergence and Services Lecture Notes in Electrical Engineering Korea"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014790"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref1","first-page":"1","article-title":"A novel approach to watermark text documents based on Eigen values","author":"rethika","year":"2009","journal-title":"Proceedings of the Ninth International Conference on Network and Service Security (N2S'09)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IS3C.2014.42"}],"event":{"name":"2015 11th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 11th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484378\/7492733\/07492746.pdf?arnumber=7492746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:31:43Z","timestamp":1498307503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7492746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isias.2015.7492746","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}