{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:56:43Z","timestamp":1756310203664,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/pais.2018.8598511","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:07:51Z","timestamp":1546556871000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["IoT Securing System using Fuzzy Commitment for DCT-based Fingerprint Recognition"],"prefix":"10.1109","author":[{"given":"Atef","family":"Bentahar","sequence":"first","affiliation":[]},{"given":"Abdallah","family":"Meraoumia","sequence":"additional","affiliation":[]},{"given":"Hakim","family":"Bendjenna","sequence":"additional","affiliation":[]},{"given":"Abdelhakim","family":"Zeroual","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"La biom&#x00E9;trie techniques et usages","author":"dorizzi","year":"2004","journal-title":"Techniques de l&#x2019;ing&#x00E9;nieur Cryptographie authentification protocoles de s&#x00E9;curit&#x00E9; et VPN"},{"journal-title":"NIST database Biometric Special Databases and Software","year":"2010","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICALIP.2014.7009803"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAS.2007.4658460"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.18"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2006.1613625"},{"journal-title":"FVC2000 Fingerprint Verification Competition","year":"2000","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04519-1_6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INVENTIVE.2016.7823273"},{"key":"ref34","first-page":"28:1","article-title":"A Survey on Antispoofing Schemes for Fingerprint Recognition Systems","volume":"47","author":"marasco","year":"2014","journal-title":"ACM Comput Surv"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPICES.2017.8091360"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2013.2248891"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/SR-07-2017-0131"},{"key":"ref15","first-page":"32","article-title":"A novel authentication framework based on bio-metric and radio fingerprinting for the IoT in eHealth","author":"habib","year":"2014","journal-title":"Proc of the third International Conference on Smart Systems Devices and Technologies (SMART)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/978-3-642-30436-1_38","article-title":"Multi-modal behavioural biometric authentication for mobile devices","volume":"376","author":"saevanee","year":"2012","journal-title":"IFIP Advances in Information and Communication Technology"},{"key":"ref17","first-page":"650","article-title":"Fingerprint classification using orientation field Flow Curves","author":"dass","year":"2004","journal-title":"Conference ICVGIP"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2009.5396047"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1006\/rtim.2001.0283"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990213"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4454707"},{"key":"ref27","first-page":"371","article-title":"A GABOR filter-based approach to fingerprint recognition","author":"lee","year":"1999","journal-title":"IEEE Workshop on Signal Processing Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527491"},{"key":"ref6","first-page":"1","article-title":"Low-Rate Wireless Personal Area Networks (LR-WPANs)","author":"howitt","year":"2011","journal-title":"Wireless Communications and Networking"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2001.920996"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.08.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2020235"},{"key":"ref2","first-page":"1","article-title":"The internet of things, How the next evolution of the Internet is Changing everything","volume":"1","author":"evans","year":"2011","journal-title":"Cisco Internet Business Solutions Group (IBSG)"},{"key":"ref9","first-page":"1","article-title":"IEEE Standard for Information technology--Telecommunications and information exchange between systems - Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation","year":"2017","journal-title":"IEEE Std 802 11ah-2016 (Amendment to IEEE Std 802 11-2016 as amended by IEEE Std 802 11ai-2016)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2387155"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2005.1566893"},{"key":"ref22","article-title":"A correlation-based fingerprint verification system","author":"bazen","year":"2000","journal-title":"ProRISC 2000 Workshop on Circuits Systems and Signal Processing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EIC.2015.7230719"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIP.2002.1201939"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958099"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530379"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/34.566808"}],"event":{"name":"2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS)","start":{"date-parts":[[2018,10,24]]},"location":"Tebessa","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8579098\/8598478\/08598511.pdf?arnumber=8598511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:58:08Z","timestamp":1643155088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8598511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/pais.2018.8598511","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}