{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:12Z","timestamp":1750307172715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393280","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"377-381","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Next generation biometric security system"],"prefix":"10.1145","author":[{"given":"M.","family":"Sujithra","sequence":"first","affiliation":[{"name":"Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, India"}]},{"given":"G.","family":"Padmavathi","sequence":"additional","affiliation":[{"name":"Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Uwe Bubeck Dina Sanchez \"Biometric Authentication Technology and Evaluation\" Term Project CS574 Spring 2003 San Diego State University.  Uwe Bubeck Dina Sanchez \" Biometric Authentication Technology and Evaluation \" Term Project CS574 Spring 2003 San Diego State University."},{"key":"e_1_3_2_1_2_1","volume-title":"Advanced identity Verification\" Ashbourn","author":"Julian","year":"2000","unstructured":"Julian \"Biometrics : Advanced identity Verification\" Ashbourn , Springer , London , 2000 . Julian \"Biometrics: Advanced identity Verification\" Ashbourn, Springer, London, 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"February","author":"Baird","year":"2002","unstructured":"Baird , Stephen \"Biometrics\". The Technology Teacher , February 2002 . Baird, Stephen \"Biometrics\". The Technology Teacher, February 2002."},{"key":"e_1_3_2_1_4_1","unstructured":"www.biometrics.pbworks.com  www.biometrics.pbworks.com"},{"key":"e_1_3_2_1_5_1","volume-title":"Samir et al. \"Biometrics: Identity Verification in a Networked World\" Wiley Computer Publishing","author":"Nanavati","year":"2002","unstructured":"Nanavati , Samir et al. \"Biometrics: Identity Verification in a Networked World\" Wiley Computer Publishing , New York , 2002 Nanavati, Samir et al. \"Biometrics: Identity Verification in a Networked World\" Wiley Computer Publishing, New York, 2002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2002.1016693"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"e_1_3_2_1_8_1","unstructured":"www.efytimes.com  www.efytimes.com"},{"key":"e_1_3_2_1_9_1","volume-title":"46th International Symposium Electronics in Marine, ELMAR-2004","author":"Kresimir Delac A","year":"2004","unstructured":"Kresimir Delac , Mislav Grgic \" A Survey of Biometric Recognition Methods\" 46th International Symposium Electronics in Marine, ELMAR-2004 , 16--18 June 2004 , Zadar, Croatia Kresimir Delac, Mislav Grgic \"A Survey of Biometric Recognition Methods\" 46th International Symposium Electronics in Marine, ELMAR-2004, 16--18 June 2004, Zadar, Croatia"},{"key":"e_1_3_2_1_10_1","unstructured":"Cernet \"Characteristics of Biometric Systems\".  Cernet \" Characteristics of Biometric Systems \"."},{"key":"e_1_3_2_1_11_1","first-page":"2019","volume-title":"proceedings of the IEEE","volume":"91","author":"Lawernce","year":"2003","unstructured":"Lawernce o'gorman, \"comparing passwords , tokens and biometrics for user authentication \", proceedings of the IEEE , vol. 91 , No. 12, Dec, pp. 2019 -- 2040 , 2003 Lawernce o'gorman, \"comparing passwords, tokens and biometrics for user authentication\", proceedings of the IEEE, vol.91, No.12, Dec, pp.2019--2040, 2003"},{"key":"e_1_3_2_1_12_1","volume-title":"Biometrics: Personal Identification in Networked Society","author":"Jain A. K.","year":"1999","unstructured":"Jain A. K. , Bolle R. and Pankanti S. , \" Biometrics: Personal Identification in Networked Society \", Kluwer Academic , 1999 Jain A. K., Bolle R. and Pankanti S., \"Biometrics: Personal Identification in Networked Society\", Kluwer Academic, 1999"},{"key":"e_1_3_2_1_13_1","volume-title":"An Efficient Gait Recognition System for Human Identification using modified ICA\" IJCSIT vol 2. No.1","author":"Pushpa Rani G.","year":"2012","unstructured":"M. Pushpa Rani and G. Arumugam , \" An Efficient Gait Recognition System for Human Identification using modified ICA\" IJCSIT vol 2. No.1 Feb , 2012 M. Pushpa Rani and G. Arumugam, \"An Efficient Gait Recognition System for Human Identification using modified ICA\" IJCSIT vol 2. No.1 Feb, 2012"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"e_1_3_2_1_16_1","unstructured":"B. Srinivasan V. K. Narendira Kumar \"Implementation of Efficient Secured Biometric Identification System Using Iris Technology\" International Journal of Advanced Engineering & Application Jan 2011 Issue  B. Srinivasan V. K. Narendira Kumar \" Implementation of Efficient Secured Biometric Identification System Using Iris Technology \" International Journal of Advanced Engineering & Application Jan 2011 Issue"},{"key":"e_1_3_2_1_17_1","volume-title":"Sep14","author":"Japan","year":"2001","unstructured":"AIM Japan , Automatic Identification seminar , Sep14 , 2001 AIM Japan, Automatic Identification seminar, Sep14, 2001"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:47Z","timestamp":1750240487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393280"}},"subtitle":["<i>an approach for mobile device security<\/i>"],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":17,"alternative-id":["10.1145\/2393216.2393280","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393280","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}