{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:14Z","timestamp":1750309214767,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Arastirma Kurumu","doi-asserted-by":"publisher","award":["1.06E+119"],"award-info":[{"award-number":["1.06E+119"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460920","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A lightweight biometric signature scheme for user authentication over networks"],"prefix":"10.1145","author":[{"given":"Tansu","family":"Alpcan","sequence":"first","affiliation":[{"name":"Deutsche Telekom Laboratories, Berlin, Germany"}]},{"given":"Sinan","family":"Kesici","sequence":"additional","affiliation":[{"name":"Bogazici University, Istanbul, Turkey"}]},{"given":"Daniel","family":"Bicher","sequence":"additional","affiliation":[{"name":"Technische Universitat Berlin, Berlin, Germany"}]},{"given":"M. Kivan\u00e7","family":"Mih\u00e7ak","sequence":"additional","affiliation":[{"name":"Bogazici University, Istanbul, Turkey"}]},{"given":"Christian","family":"Bauckhage","sequence":"additional","affiliation":[{"name":"Deutsche Telekom Laboratories, Berlin, Germany"}]},{"given":"S. Ahmet","family":"\u00c7amtepe","sequence":"additional","affiliation":[{"name":"Technische Universitat Berlin"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277447"},{"key":"e_1_3_2_1_2_1","first-page":"3","volume-title":"Proc. of 15th USENIX Security Symposium","author":"Ballard L.","year":"2006","unstructured":"L. Ballard , F. Monrose , and D. Lopresti . Biometric authentication revisited: understanding the impact of wolves in sheep's clothing . In Proc. of 15th USENIX Security Symposium , pages 3 -- 3 , Berkeley, CA, USA , 2006 . USENIX Association. L. Ballard, F. Monrose, and D. Lopresti. Biometric authentication revisited: understanding the impact of wolves in sheep's clothing. In Proc. of 15th USENIX Security Symposium, pages 3--3, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/129837"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Proc. of 8th USENIX Security Symposium","volume":"8","author":"Jermyn I.","year":"1999","unstructured":"I. Jermyn , A. Mayer , F. Monrose , M. K. Reiter , and A. D. Rubin . The design and analysis of graphical passwords . In Proc. of 8th USENIX Security Symposium , volume 8 , pages 1 -- 1 , Berkeley, CA, USA , 1999 . USENIX Association. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In Proc. of 8th USENIX Security Symposium, volume 8, pages 1--1, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-3-540-30182-0_38","volume-title":"Proc. of 19th Int. Symp. on Computer and Information Sciences, ISCIS","author":"Kholmatov A.","year":"2004","unstructured":"A. Kholmatov and B. Yanikoglu . Biometric authentication using online signatures . In Proc. of 19th Int. Symp. on Computer and Information Sciences, ISCIS 2004 , Lecture Notes in Computer Science , pages 373 -- 380 . Springer Berlin \/ Heidelberg , Antalya, Turkey , October 2004. A. Kholmatov and B. Yanikoglu. Biometric authentication using online signatures. In Proc. of 19th Int. Symp. on Computer and Information Sciences, ISCIS 2004, Lecture Notes in Computer Science, pages 373--380. Springer Berlin \/ Heidelberg, Antalya, Turkey, October 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/6294.899930"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214504000000827"},{"key":"e_1_3_2_1_8_1","first-page":"218","volume-title":"Proc. of 15th Int. Conf. on Vision Interface VI'2002","author":"Parker J. R.","year":"2002","unstructured":"J. R. Parker . Simple distances between handwritten signatures . In Proc. of 15th Int. Conf. on Vision Interface VI'2002 , pages 218 -- 222 , Calgary, Canada , May 2002 . J. R. Parker. Simple distances between handwritten signatures. In Proc. of 15th Int. Conf. on Vision Interface VI'2002, pages 218--222, Calgary, Canada, May 2002."},{"key":"e_1_3_2_1_9_1","unstructured":"F. Research. State of retailing online: a shop.org study. http:\/\/www.nrf.com 2007.  F. Research. State of retailing online: a shop.org study. http:\/\/www.nrf.com 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.2007.4450956"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25976-3_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/839290.842629"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228096"},{"key":"e_1_3_2_1_14_1","volume-title":"SVC2004: First international signature verification competition. In Proc. of 1st Int. Conf. on Biometric Authentication, ICBA 2004","volume":"2004","author":"Yeung D.","year":"2004","unstructured":"D. Yeung , H. Chang , Y. Xiong , S. George , R. Kashi , T. Matsumoto , and G. Rigoll . SVC2004: First international signature verification competition. In Proc. of 1st Int. Conf. on Biometric Authentication, ICBA 2004 , volume 3072\/ 2004 of Lecture Notes in Computer Science, pages 16--22. Springer Berlin \/ Heidelberg, Hong Kong, China , July 2004 . D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. SVC2004: First international signature verification competition. In Proc. of 1st Int. Conf. on Biometric Authentication, ICBA 2004, volume 3072\/2004 of Lecture Notes in Computer Science, pages 16--22. Springer Berlin \/ Heidelberg, Hong Kong, China, July 2004."}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Istanbul Turkey","acronym":"Securecomm08"},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":14,"alternative-id":["10.1145\/1460877.1460920","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460920","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}